fusing beliefs of multi layer metrics for detecting
play

Fusing Beliefs of Multi-Layer Metrics for Detecting Security - PowerPoint PPT Presentation

Fusing Beliefs of Multi-Layer Metrics for Detecting Security Attacks Konstantinos Kyriakopoulos Francisco J. Aparicio Navarro David Parish Coseners House - July 2011 Wednesday, 6 July 2011 Overview Introduction Aims Metrics -


  1. Fusing Beliefs of Multi-Layer Metrics for Detecting Security Attacks Konstantinos Kyriakopoulos Francisco J. Aparicio Navarro David Parish Cosener’s House - July 2011 Wednesday, 6 July 2011

  2. Overview ✴ Introduction ✴ Aims ✴ Metrics - Methodology ✴ Data Fusion: D-S ✴ Examined Attacks ✴ Detection Results ✴ Conclusions - Future Work Wednesday, 6 July 2011

  3. Introduction ✴ Wireless Network increasingly at risk. ✴ Current IDS tools focus on one layer or do not utilise metrics intelligently. ✴ Performance of single metric can be poor. ✴ Multi-layer approach may result in higher detection accuracy. Wednesday, 6 July 2011

  4. Aims ✴ Collect metrics from multiple layers ✴ Combine metrics using Data Fusion ✴ Better accuracy from conventional methods ✴ Concept: • low cost • scalable • applicable to other wireless technologies Wednesday, 6 July 2011

  5. Wednesday, 6 July 2011

  6. Metrics Network TTL Layer N A V Inj. Rate MAC Final Data Layer decision Fusion about attack Seq # RSSI Physical Layer ✴ MAC Seq # : counter of frames from node ✴ NAV: Can be used as signature for node Wednesday, 6 July 2011

  7. Methodology Capture Packets Get metrics: RSSI Most Volatile Construct statistics (mode-avg) RATE Distance of metric from TTL per flow (mode/avg of metric) NAV Assign belief in attack for each metric SEQ # Least Volatile Fuse beliefs for each metric with Dempster-Shafer Wednesday, 6 July 2011

  8. Data Fusion Network TTL Layer N A V Inj. Rate MAC Final Data Layer decision Fusion about attack Seq # RSSI ✴ Dempster-Shafer because: Physical Layer • Deals with uncertainty • No a priori knowledge Wednesday, 6 July 2011

  9. Test-bed ) ) ) ) ) ) Attacker BackTrack 4 Atheros Card ) ) ) ) INTERNET ) ) ) ) ) ) ) ) Monitor BackTrack 4 Access Point Atheros Card ) AP ) ) ) ) ) Client Atheros Card Wednesday, 6 July 2011

  10. MitM Attack @ PHY 1. Intercepts traffic 2. Analyses it ) ) 3. Injects forged frames ) ) ) ) Attacker BackTrack 4 Atheros Card ) ) ) ) INTERNET ) ) ) ) ) ) ) ) Monitor BackTrack 4 Access Point Atheros Card ) ) AP ) ) ) ) Client Atheros Card ✴ Man in the Middle (MitM) ✴ Takes advantage of lag time ✴ Injects its own content Wednesday, 6 July 2011

  11. Results: MitM Attack Metrics Type % Result % FN 0 0 NAV + SEQ NAV + SEQ FP 7/63 11.1 FN 0 0 RSSI + NAV + SEQ + SEQ FP 8/63 12.7 FN 0 0 RSSI + TTL + RATE RATE FP 0 0 FN 0 0 All metrics All metrics FP 0 0 Wednesday, 6 July 2011

  12. Rogue AP attack INTERNET 2. Responds to Probes Requests Attacker BackTrack 4 Atheros Card INTERNET 1. Disassociates Monitor Access Point BackTrack 4 client AP Atheros Card Client Atheros Card Wednesday, 6 July 2011

  13. Rogue AP: Tools Method Rate ESSID Spoof Fixed at Airbase No 1Mbps Fixed at Airbase -a Yes 1Mbps Host AP Normal Rate No Wednesday, 6 July 2011

  14. Results: Rogue AP Airbase Metrics Type Airbase HostAP ESSID Spoof Detected ? Yes Yes Yes NAV + NAV + SEQ SEQ FP 0/405 0/246 0/57 RSSI + Detected ? Yes Yes Yes NAV + NAV + FP 35/405 2/246 3/57 SEQ RSSI + Detected ? No Yes No TTL + TTL + FP 100% 0/246 100% RATE Detected ? Yes Yes Yes All metrics metrics FP 0/405 0/246 0/57 Wednesday, 6 July 2011

  15. Benefit of extra metrics No. of Metrics Beliefs Attack No Attack Uncertainty NAV-SEQ 0.569 0.314 0.118 RSSI - NAV - SEQ 0.664 0.263 0.073 RSSI - TTL - Rate 0.575 0.329 0.096 5 metrics 0.710 0.272 0.018 Wednesday, 6 July 2011

  16. Benefit of extra metrics ✴ Benefit: Can adapt in case AP resets Seq # for valid reasons Wednesday, 6 July 2011

  17. Things to consider: ✴ Assume Normal traffic more than Attack ✴ Algorithm cleans polluted metrics from history given that several conditions apply: • If attack in NAV and if attack in SEQ # then remove last metrics from statistics Wednesday, 6 July 2011

  18. Conclusions ✴ Single metrics: • Inefficient, Inaccurate, Misleading ✴ Multi-metrics: • Synergistic Approach, More Accurate ✴ Data Fusion: Dempster-Shafer Wednesday, 6 July 2011

  19. Current and Future Work ✴ Automate assignment of beliefs ✴ Dynamic selection of metrics Wednesday, 6 July 2011

  20. Thank You ... Wednesday, 6 July 2011

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend