05.01.2013 Views

Ad Hoc Networks : Technologies and Protocols - University of ...

Ad Hoc Networks : Technologies and Protocols - University of ...

Ad Hoc Networks : Technologies and Protocols - University of ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

262 Security in Mobile <strong>Ad</strong>-<strong>Hoc</strong> <strong>Networks</strong><br />

Audit Data. We suggest these three local data sources be used for anomaly<br />

detection: (1) topology information, such as node moving speed, (2) local<br />

routing information, such as route cache entries <strong>and</strong> route updates; <strong>and</strong> (3)<br />

traffic information, all incoming <strong>and</strong> outgoing traffic statistics, including interarrival<br />

periods <strong>and</strong> frequencies. We use only local information because remote<br />

nodes can be compromised <strong>and</strong> their data cannot be trusted. The intuition<br />

here is that there should be correlation between node movements <strong>and</strong> routing<br />

table changes, <strong>and</strong> between routing changes <strong>and</strong> traffic changes under normal<br />

conditions, <strong>and</strong> that such information can be used to detect anomalies caused<br />

by attacks.<br />

Features. In our study, we define a total <strong>of</strong> 141 features according to domain<br />

knowledge <strong>and</strong> intuition. These features belong to two categories, non-traffic<br />

related <strong>and</strong> traffic related. The non-traffic related features are listed in Table 9.1.<br />

They capture the basic view <strong>of</strong> network topology <strong>and</strong> routing operations. In<br />

addition, “absolute velocity” characterizes the physical movement <strong>of</strong> a node.<br />

The traffic related features are collected based on the following considerations.<br />

Packets come from different layers <strong>and</strong> different sources. For example,<br />

it can be a TCP data packet or a route control message packet (for instance, a<br />

ROUTE REQUEST message used in AODV <strong>and</strong> DSR) that is being forwarded at<br />

the observed node. We can define the first two aspects or dimensions <strong>of</strong> a traffic<br />

feature as, packet type, which can be data specific <strong>and</strong> route specific (including<br />

different route messages used in AODV <strong>and</strong> DSR), <strong>and</strong> flow direction, which<br />

can take one <strong>of</strong> the following values, received (observed at destinations),<br />

sent (observed at sources), forwarded (observed at intermediate routers) or<br />

dropped (observed at routers where no route is available for the packet). We<br />

need to evaluate both short-term <strong>and</strong> long-term traffic patterns. In our experiments,<br />

we sample data in three predetermined sampling periods, 5 seconds, 1<br />

minute <strong>and</strong> 15 minutes. Finally, for each traffic pattern, we choose two typical<br />

statistics measures widely used in literature, namely, the packet count <strong>and</strong> the<br />

st<strong>and</strong>ard deviation <strong>of</strong> inter-packet intervals. Overall, a traffic feature has the<br />

following dimensions: packet type, flow direction, sampling periods, <strong>and</strong> statistics<br />

measures. An example is the feature that computes the st<strong>and</strong>ard deviation<br />

<strong>of</strong> inter-packet intervals <strong>of</strong> received ROUTE REQUEST packets every 5 seconds.<br />

All dimensions <strong>and</strong> allowed values for each dimension are defined in Table 9.2.<br />

Classifiers. We use the cross-feature analysis approach discussed in Section<br />

9.4.2 for anomaly detection, where a classifier is built for each feature<br />

using the rest <strong>of</strong> the features. We use several classification algorithms for<br />

evaluation purposes. These classifiers are C4.5 [36], a decision tree classifier,<br />

RIPPER [11], a rule based classifier, SVM Light [23], a support vector machine

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!