Skip to main content
Erschienen in: Wireless Networks 3/2016

01.04.2016

Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks

verfasst von: Menaka Pushpa Arthur, Kathiravan Kannan

Erschienen in: Wireless Networks | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multicast communication of mobile ad hoc networks (MANET), rather than multiple unicast communication, delivers common content to more than one receiver at a time. Due to cutting-edge communication technology and advancements in terms of radio-mounted devices, groups in front-end war field, as well as rescue troops, are well connected to carry out their missions using multicast communication. The key to the success of military networks in a hostile environment is security and collaboration. Internal attacks are major threats to impose a great failure in their mission goal. We introduce a novel indirect internal stealthy attack and known direct internal stealthy attacks such as black hole and deny-to-forward attacks on tree-based multicast routing protocol. These internal attacks can induce the performance degradation in the multicast group. We design a distributed cross-layer based machine learning anomaly detection system for multicast communication of MANET. Using efficient multilayer features, rather than routing layer features alone, improve the accuracy of the Intrusion Detection System (IDS) in terms of detection of direct and indirect internal stealthy attacks. We evaluate the sensitivity, specificity and detection accuracy of well-known multiclass classifiers in combination with various feature subset selection algorithms. Since our problem with classification is a multiclass, the performance metrics calculated here are different from the binary classifiers. Our IDS is efficient, with respect to high true positives, very low false positives and less resource consumption even in the very challenging conditions of multicast communication of ad hoc networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Buttyan, L., & Hubaux, J.-P. (2007). Security and cooperation in wireless networks: Thwarting malicious and selfish behavior in the age of ubiquitous computing. New York: Cambridge University Press.CrossRef Buttyan, L., & Hubaux, J.-P. (2007). Security and cooperation in wireless networks: Thwarting malicious and selfish behavior in the age of ubiquitous computing. New York: Cambridge University Press.CrossRef
2.
Zurück zum Zitat Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
3.
Zurück zum Zitat Zhou, J., et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef Zhou, J., et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef
5.
Zurück zum Zitat Mohapatra, P., Chao, G., & Jian, L. (2004). Group communications in mobile ad hoc networks. Computer, 37(2), 52–59.CrossRef Mohapatra, P., Chao, G., & Jian, L. (2004). Group communications in mobile ad hoc networks. Computer, 37(2), 52–59.CrossRef
6.
Zurück zum Zitat Obraczka, K., & Tsuduk, G. (1998). Multicast routing issues in ad hoc networks. IEEE International Conference on ICUPC ’98, 1, 751–756. Obraczka, K., & Tsuduk, G. (1998). Multicast routing issues in ad hoc networks. IEEE International Conference on ICUPC ’98, 1, 751–756.
7.
Zurück zum Zitat Khalil, I., & Bagchi, S. (2011). Stealthy attacks in wireless ad hoc networks: Detection and countermeasure. IEEE Transactions on Mobile Computing, 10(8), 1096–1112.CrossRef Khalil, I., & Bagchi, S. (2011). Stealthy attacks in wireless ad hoc networks: Detection and countermeasure. IEEE Transactions on Mobile Computing, 10(8), 1096–1112.CrossRef
8.
Zurück zum Zitat He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef
9.
Zurück zum Zitat Yan, Z. et al. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. doi:10.1002/sec.1243. Yan, Z. et al. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. doi:10.​1002/​sec.​1243.
10.
Zurück zum Zitat Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.CrossRef Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.CrossRef
11.
Zurück zum Zitat Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.CrossRef Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.CrossRef
12.
Zurück zum Zitat Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
13.
Zurück zum Zitat Zheng, Y., et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Zheng, Y., et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
14.
Zurück zum Zitat Royer, E., & Perkins, C. (2000). Multicast ad-hoc on-demand distance vector (MAODV) routing. Internet Draft. Royer, E., & Perkins, C. (2000). Multicast ad-hoc on-demand distance vector (MAODV) routing. Internet Draft.
15.
Zurück zum Zitat Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46.CrossRef Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46.CrossRef
16.
Zurück zum Zitat Curtmola, R., & Nita-Rotaru, C. (2009). BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks. IEEE Transactions on Mobile Computing, 8(4), 445–459.CrossRef Curtmola, R., & Nita-Rotaru, C. (2009). BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks. IEEE Transactions on Mobile Computing, 8(4), 445–459.CrossRef
17.
Zurück zum Zitat Mo’men, A. M. A., Hamza, H. S., & Saroit, I. A. (2010). A survey on security enhanced multicast routing protocols in Mobile Ad hoc Networks. In High-capacity optical networks and enabling technologies (HONET ’10), pp. 262–268. Mo’men, A. M. A., Hamza, H. S., & Saroit, I. A. (2010). A survey on security enhanced multicast routing protocols in Mobile Ad hoc Networks. In High-capacity optical networks and enabling technologies (HONET ’10), pp. 262–268.
18.
Zurück zum Zitat Feng, H., Kuan, H., & Hao, M. (2010). S-MAODV: A trust key computing based secure Multicast Ad-hoc On Demand Vector routing protocol. In 3rd IEEE international conference on computer science and information technology (ICCSIT), Vol. 6, pp. 434–438. Feng, H., Kuan, H., & Hao, M. (2010). S-MAODV: A trust key computing based secure Multicast Ad-hoc On Demand Vector routing protocol. In 3rd IEEE international conference on computer science and information technology (ICCSIT), Vol. 6, pp. 434–438.
19.
Zurück zum Zitat Moamen, A. A., Haitham, H. S., & Saroit, I. A. (2014). Secure multicast routing protocols in mobile ad-hoc networks. International Journal of Communication Systems, 27(11), 2808–2831. Moamen, A. A., Haitham, H. S., & Saroit, I. A. (2014). Secure multicast routing protocols in mobile ad-hoc networks. International Journal of Communication Systems, 27(11), 2808–2831.
20.
Zurück zum Zitat Jing, D., Curtmola, R., & Nita-Rotaru, C. (2011). Secure high-throughput multicast routing in wireless mesh networks. IEEE Transactions on Mobile Computing, 10(5), 653–668.CrossRef Jing, D., Curtmola, R., & Nita-Rotaru, C. (2011). Secure high-throughput multicast routing in wireless mesh networks. IEEE Transactions on Mobile Computing, 10(5), 653–668.CrossRef
21.
Zurück zum Zitat Mo’men, A. M. A., Hamza, H. S., & Saroit, I. A. (2010). New attacks and efficient countermeasures for multicast AODV. In High-capacity optical networks and enabling technologies (HONET ’10), pp. 51–57. Mo’men, A. M. A., Hamza, H. S., & Saroit, I. A. (2010). New attacks and efficient countermeasures for multicast AODV. In High-capacity optical networks and enabling technologies (HONET ’10), pp. 51–57.
22.
Zurück zum Zitat Roy, S., Addada, V. G., Setia, S., & Jajodia, S. (2005). Securing MAODV: Attacks and countermeasures. In 2nd Annual IEEE communications society conference on sensor and ad hoc communications and networks, IEEE SECON’05, pp. 521–532. Roy, S., Addada, V. G., Setia, S., & Jajodia, S. (2005). Securing MAODV: Attacks and countermeasures. In 2nd Annual IEEE communications society conference on sensor and ad hoc communications and networks, IEEE SECON’05, pp. 521–532.
23.
Zurück zum Zitat Pushpa, A. M., & Kathiravan, K. (2013). Secure multicast routing protocol against internal attacks in mobile ad hoc networks. In 7th IEEE GCC conference and exhibition (GCC’13), pp. 245–250, 17–20. Pushpa, A. M., & Kathiravan, K. (2013). Secure multicast routing protocol against internal attacks in mobile ad hoc networks. In 7th IEEE GCC conference and exhibition (GCC’13), pp. 245–250, 17–20.
24.
Zurück zum Zitat Menaka, P. A., Kathiravan, K. (2013). Resilient PUMA (Protocol for Unified Multicasting through Announcement) against internal attacks in Mobile Ad hoc Networks. In IEEE intertional conference on advances in computing, communications & informatics (ICACCI’13), pp. 1906–1912. Menaka, P. A., Kathiravan, K. (2013). Resilient PUMA (Protocol for Unified Multicasting through Announcement) against internal attacks in Mobile Ad hoc Networks. In IEEE intertional conference on advances in computing, communications & informatics (ICACCI’13), pp. 1906–1912.
25.
Zurück zum Zitat Shim, Y. (2006). A Secure multicast routing protocol for ad hoc networks with misbehaving nodes (pp. 591–600). Berlin: Springer-Verlag ICCSA. Shim, Y. (2006). A Secure multicast routing protocol for ad hoc networks with misbehaving nodes (pp. 591–600). Berlin: Springer-Verlag ICCSA.
26.
Zurück zum Zitat Peng, L., Song, G., Shui, Y., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding, INFOCOM, pp. 100–108. Peng, L., Song, G., Shui, Y., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding, INFOCOM, pp. 100–108.
27.
Zurück zum Zitat Peng, L., Song, G., Shui, Y., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel & Distributed Systems, 25(12), 3264–3273.CrossRef Peng, L., Song, G., Shui, Y., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel & Distributed Systems, 25(12), 3264–3273.CrossRef
28.
Zurück zum Zitat Zubair, M., Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions Network, 18(4), 1234–1247.CrossRef Zubair, M., Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions Network, 18(4), 1234–1247.CrossRef
29.
Zurück zum Zitat Nikos, K., & Christos, D. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7(1), 171–182.CrossRef Nikos, K., & Christos, D. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7(1), 171–182.CrossRef
30.
Zurück zum Zitat Sergio, P., Mitrokotsa, A., Agustin, O., & Peris-Lopez, P. (2012). Evaluation of classification algorithms for intrusion detection in MANETs. Knowledge-Based Systems, 36, 217–225.CrossRef Sergio, P., Mitrokotsa, A., Agustin, O., & Peris-Lopez, P. (2012). Evaluation of classification algorithms for intrusion detection in MANETs. Knowledge-Based Systems, 36, 217–225.CrossRef
31.
Zurück zum Zitat Sevil, S., & Clark, J. A. (2011). Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55(15, 27), 3441–3457. Sevil, S., & Clark, J. A. (2011). Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55(15, 27), 3441–3457.
32.
Zurück zum Zitat Aikaterini, M., & Christos, D. (2013). Intrusion detection in MANET using classification algorithms: The effects of cost and model selection. Ad Hoc Networks, 11(1), 226–237.CrossRef Aikaterini, M., & Christos, D. (2013). Intrusion detection in MANET using classification algorithms: The effects of cost and model selection. Ad Hoc Networks, 11(1), 226–237.CrossRef
33.
Zurück zum Zitat Joseph, J. F. C., Bu-Sung, L., Das, A., & Boon-Chong, S. (2011). Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA. IEEE Transactions on Dependable and Secure Computing, 8(2), 233–245.CrossRef Joseph, J. F. C., Bu-Sung, L., Das, A., & Boon-Chong, S. (2011). Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA. IEEE Transactions on Dependable and Secure Computing, 8(2), 233–245.CrossRef
34.
Zurück zum Zitat Wang, X., Lin, T., & Wong, J. (2005). Feature selection in intrusion detection system over mobile ad-hoc network. Technical Report: Computer Science, lowa State University. Wang, X., Lin, T., & Wong, J. (2005). Feature selection in intrusion detection system over mobile ad-hoc network. Technical Report: Computer Science, lowa State University.
35.
Zurück zum Zitat Larry, B. (2004). Applications of learning classifier systems. Studies in fuzziness and soft computing, Vol. 150, Springer, Berlin. ISBN 978-3-540-39925-4. Larry, B. (2004). Applications of learning classifier systems. Studies in fuzziness and soft computing, Vol. 150, Springer, Berlin. ISBN 978-3-540-39925-4.
36.
Zurück zum Zitat Nguyen, H. T. (2012). Reliable machine learning algorithms for intrusion detection systems: Machine learning for information security and digital forensics, PhD thesis. Gjovik University College. Nguyen, H. T. (2012). Reliable machine learning algorithms for intrusion detection systems: Machine learning for information security and digital forensics, PhD thesis. Gjovik University College.
37.
Zurück zum Zitat Butun et al. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282. Butun et al. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.
38.
Zurück zum Zitat Garca-Teodoro, P., Daz-Verdejo, J., Maci-Fernndez, G., & Vzquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(12), 18–28.CrossRef Garca-Teodoro, P., Daz-Verdejo, J., Maci-Fernndez, G., & Vzquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(12), 18–28.CrossRef
39.
Zurück zum Zitat Anantvalee, T. (2006). A survey on intrusion detection in mobile ad hoc networks. In Y. Xiao, X. Shen, D. -Z. Du (Eds.), Wireless/mobile network security, pp. 170–196. Anantvalee, T. (2006). A survey on intrusion detection in mobile ad hoc networks. In Y. Xiao, X. Shen, D. -Z. Du (Eds.), Wireless/mobile network security, pp. 170–196.
40.
Zurück zum Zitat Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336.CrossRef Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336.CrossRef
41.
Zurück zum Zitat Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15(4), 2027–2045.CrossRef Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15(4), 2027–2045.CrossRef
42.
Zurück zum Zitat Zhang, Y., & Wenke, L. (2000). Intrusion detection in wireless ad hoc networks. In 6th annual international conference on mobile computing and networking, MobiCom’ 2000, Boston. Zhang, Y., & Wenke, L. (2000). Intrusion detection in wireless ad hoc networks. In 6th annual international conference on mobile computing and networking, MobiCom’ 2000, Boston.
43.
Zurück zum Zitat Zhang, Y., Lee, W., & Huang, Y.-A. (2003). Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5), 545–556.CrossRef Zhang, Y., Lee, W., & Huang, Y.-A. (2003). Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5), 545–556.CrossRef
44.
Zurück zum Zitat Zhu, Y., & Kunz, T. (2008). MAODV Implementation for NS-2.26, Technical Report SCE-04-01. Carleton University Zhu, Y., & Kunz, T. (2008). MAODV Implementation for NS-2.26, Technical Report SCE-04-01. Carleton University
45.
Zurück zum Zitat Hongmei, D., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), 70–75.CrossRef Hongmei, D., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), 70–75.CrossRef
47.
Zurück zum Zitat Majid, K., Behzad, M., Vasile, P., Hamid, N., & Caro, L. (2010). Using classifier fusion techniques for protein secondary structure prediction. International Journal of Computational Intelligence in Bioinformatics and Systems Biology, 1(4), 418–434.CrossRef Majid, K., Behzad, M., Vasile, P., Hamid, N., & Caro, L. (2010). Using classifier fusion techniques for protein secondary structure prediction. International Journal of Computational Intelligence in Bioinformatics and Systems Biology, 1(4), 418–434.CrossRef
48.
Zurück zum Zitat Fernandez Caballero, J. C., Martine, F. J., Hervas, C., & Gutierrez, P. A. (2010). Sensitivity Versus accuracy in multiclass problems using memetic pareto evolutionary neural networks. IEEE Transactions on Neural Networks, 21(5), 750–770.CrossRef Fernandez Caballero, J. C., Martine, F. J., Hervas, C., & Gutierrez, P. A. (2010). Sensitivity Versus accuracy in multiclass problems using memetic pareto evolutionary neural networks. IEEE Transactions on Neural Networks, 21(5), 750–770.CrossRef
Metadaten
Titel
Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks
verfasst von
Menaka Pushpa Arthur
Kathiravan Kannan
Publikationsdatum
01.04.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 3/2016
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1065-2

Weitere Artikel der Ausgabe 3/2016

Wireless Networks 3/2016 Zur Ausgabe

Neuer Inhalt