Intrusion Detection System based on Cluster

클러스터를 기반으로 한 침입탐지시스템

  • 양환석 (호원대학교 사어버수사경찰학부)
  • Received : 2009.07.30
  • Accepted : 2009.09.29
  • Published : 2009.09.30

Abstract

Security system of wireless network take on importance as use of wireless network increases. Detection and opposition about that is difficult even if attack happens because MANET is composed of only moving node. And it is difficult that existing security system is applied as it is because of migratory nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system using cluster head in order to detect malicious attack and use resources efficiently. we used method that gathering of rules is defined and it judges whether it corresponds or not to detect intrusion more exactly. In order to evaluate performance of proposed method, we used blackhole, message negligence, jamming attack.

무선 네트워크 사용이 증가하면서 무선 네트워크의 보안 시스템의 중요성이 부각되고 있는 실정이다. MANET은 이동 노드만으로 구성되어 있기 때문에 공격이 발생해도 그에 대한 탐지나 대응이 어렵다. 그리고 노드들의 이동성 때문에 유선 네트워크 환경에서 사용하던 보안 시스템을 그대로 적용하기에는 어려움이 많다. 따라서 이러한 환경에서 공격자의 악의적인 공격으로부터 시스템을 보호하고 즉각적으로 대처해야만 한다. 본 논문에서는 악의적인 공격을 탐지하고 자원의 효율적 사용을 위해서 클러스터를 헤드를 이용한 침입탐지 시스템을 제안한다. 보다 정확한 침입탐지를 위해 규칙들의 집합을 정의하고 일치 여부를 판단하는 방법을 이용하였다. 제안한 방법의 성능 평가를 위해서 blackhole, message negligence, jamming 공격을 이용하였다.

Keywords

References

  1. Guorui Li, "A Distributed Intrusion Detection Scheme for Wireless Sensor Networks", the 28th International Conference on Distributed Computing Systems Workshops, June 2008.
  2. Peng Ning, "Mitigating DoS Attacks against Signature-Based Broadcast Authentication in Wireless Sensor Networks", ACM journal no.20, 2005.
  3. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks:Attacks and countermewsures", in the Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
  4. J. Deng, R. Han, and S. Mishra, "A performance evaluation of intrusion-tolerant routing in wireless sensor networks", In Proceeding of IEEE 2nd Int'l Workshop on info Processing in Sensor Networks, April 2003.
  5. Salvatore J. Stolfo, et al., "Anomaly Detection in Computer Security and an Application to File System Accesses", Proceedings of 15th International Symposium of Foundations of Intelligent Systems, 2005.
  6. Shi Zhong, Taghi M. Khoshgoftaar, and Naeem Seluya, " Evaluating Clustering Techniques for Network Intrusion Detection.", In Proceeding of the 10th ISSAT International Conference on Reliability and Quality and Design, pp.149-155. Las Vegas, Nevada, 2004.
  7. Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: A defense aginst wormhole attacks in wireless networks", In Proceeding of IEEE Infocomm, pp.349-364, 2003.