eaack—a secure intrusion detection.ppt
DESCRIPTION
PPT foe EAACK which is an IDS for MANETsTRANSCRIPT
![Page 1: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/1.jpg)
A Secure Intrusion-Detection
System for MANETs using EAACK scheme
1
By
Kshirsagar Sachin Laxman
WCE sangli.
![Page 2: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/2.jpg)
Content
EAACK-Secure IDS For MANET's
2
Introduction
Problem Statement
Objectives
Methodology
References
![Page 3: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/3.jpg)
Introduction to MANETs
EAACK-Secure IDS For MANET's
3
Mobile Ad hoc Network(MANET) –
collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bidirectional wireless links
No need of infrastructue
Vulnerable to malicious attacks
![Page 4: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/4.jpg)
Types
EAACK-Secure IDS For MANET's
4
single-hop network:
-Nodes communicate directly
multi-hop network :
-relay of messages by neighbors
![Page 5: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/5.jpg)
IDS in MANET
EAACK-Secure IDS For MANET's
5
Assumption that all nodes cooperate
Significant impact if some nodes are compromised
IDS work as a second layer in MANETS
![Page 6: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/6.jpg)
IDS in MANET
EAACK-Secure IDS For MANET's
6
Watchdog
TWOACK
AACK
![Page 7: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/7.jpg)
Watchdog
EAACK-Secure IDS For MANET's
7
Watchdog and pathrater
capable of detecting malicious nodes misbehaviors
in network
if node fails to forward packet within time,
increases failure counter
![Page 8: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/8.jpg)
Problems with Watchdog
EAACK-Secure IDS For MANET's
8
1. False Misbehavior :
Node A sends back a misbehavior report even
through node B forwarded the packet to C
Fig:False Misbehavior
![Page 9: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/9.jpg)
EAACK-Secure IDS For MANET's
9
2. Limited Transmission Power:
Node B intentionally limits its transmission power
![Page 10: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/10.jpg)
EAACK-Secure IDS For MANET's
10
3)Receiver collision
![Page 11: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/11.jpg)
TWOACK
EAACK-Secure IDS For MANET's
11
resolve receiver collision and limited transmission power problem
![Page 12: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/12.jpg)
AACK
EAACK-Secure IDS For MANET's
12
combination of TACK and end to end ACK
first ACK is used if it fails switch to TACK
![Page 13: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/13.jpg)
Digital Signature
EAACK-Secure IDS For MANET's
13
Digital Signature is an authentication mechanism
which Provide valid acknowledgement in manet.
Fig: communication with Digital signature
![Page 14: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/14.jpg)
Problem Statement
EAACK-Secure IDS For MANET's
14
Design and implementation of an intrusion detection system
for Mobile Adhoc Networks using EAACK scheme.
![Page 15: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/15.jpg)
Objectives
EAACK-Secure IDS For MANET's
15
Study of different Intrusion Detection Systems for MANETs
Study of NS2 and other required softwares.
Implementation of IDS for MANETs using
EAACK scheme.
Use of digital signatures in the EAACK scheme.
Comparison of EAACK performance analysis with other contemporary approaches like ACK and TWOACK
![Page 16: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/16.jpg)
EAACK
EAACK-Secure IDS For MANET's
16
Enhanced Adaptive ACKnowledgement
Solves 3 problems with watchdog
EAACK consists of three major parts:
1.ACK
2.S-ACK
3.MRA
![Page 17: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/17.jpg)
ACK
EAACK-Secure IDS For MANET's
17
Basically end to end acknowledgement.
Works as hybrid scheme in EAACK
![Page 18: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/18.jpg)
S-ACK
EAACK-Secure IDS For MANET's
18
improved version of TWOACK
let every three consecutive nodes work in a group
to detect misbehaving nodes.
misbehavior report switch the system to MRA
mode
![Page 19: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/19.jpg)
MRA
EAACK-Secure IDS For MANET's
19
resolve weakness of watchdog of detecting misbehaving nodes.
a) Source node
1)checks local knowledge base
2)if no path use DSR and send MRA to destination
b)Destination node
1)checks local knowledge base
2)if packet received then falsify the report
![Page 20: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/20.jpg)
EAACK-Secure IDS For MANET's
20
![Page 21: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/21.jpg)
Refferences
EAACK-Secure IDS For MANET's
21
[1] EAACK – A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE
[2]K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5 pp. 536–550
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile adhhoc networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265
[4] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancement in presence of misbehaving nodes inMANETs,” Int. J. Multimedia Syst., vol. 15 no. 5, pp. 273–282, Oct. 2009.
[5] J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4,pp. 1835–1841, Apr. 2008.
[6] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. IEEE 25th Int. Conf. AINA, Biopolis Singapore, Mar. 22–25, 2011, pp. 488–494.
[7] Nat. Inst. Std. Technol., Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, 2009, Digital Signature Standard (DSS).
![Page 22: Eaack—a secure intrusion detection.ppt](https://reader031.vdocument.in/reader031/viewer/2022020110/55943fca1a28abf15b8b4795/html5/thumbnails/22.jpg)
EAACK-Secure IDS For MANET's
22
THANK YOU