Intrusion Detection System In wireless Sensor network Based On ...

1 downloads 0 Views 798KB Size Report
Intrusion Detection System In wireless Sensor network Based On Mobile Agent. YousefEL Mourabit*, Ahmed Toumanari, Anouar Bouirden, Hicham zougagh, ...
Intrusion Detection System In wireless Sensor network Based On Mobile Agent YousefEL Mourabit*, Ahmed Toumanari, Anouar Bouirden, Hicham zougagh, Rachid Latif [email protected], [email protected]", [email protected], [email protected], [email protected]

Laboratory ESSI, ENSA Agadir, Ibn Zohr University AGADIR, MOROCCO

Abstract- The wireless sensor network is a network of simple

learn these features for known attacks, and how to detect new

sensing devices, which are capable of communicating with other

attacks. This has motivated research into learning algorithms

devices and sensing some changes of Incidents or parameters,

and techniques.

however, the wireless sensor network is easy to be attacked because of its features, so protecting networks against intrusions or attacks is one of the most principals posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special

Nowadays, the modern Agent was a research field of vitality and influence. Agent might be regarded as an entity existed

in

some

environment,

which

could

sense

the

environment and receive the information of the environment,

properties, has more importance. This work describes a new

then reacted to the information, so reaction in the environment,

Intrusion Detection System architecture that uses multi-agent

Agent could be software or hardware controlled by software

system and a classification algorithm to detect the intrusion. We

[4]. Multi-Agent System was related to coordinate the behavior

use the Weka tool to implement algorithms of detection intrusion

of a set of autonomous or semi-autonomous Agent, in the

and to perform the rate classification.

multi-agent

Keywords-; Intrusion Detection System; Multi-Agent System; Wireless Sensor Network;Mobile Agent.

I.

the

promise

for

monitoring,

building

with

others

each

their own problems or taking joint action.

principal reasons to propose new IDS based on mobile agents

monitoring

for wireless sensor network.

critical

II.

infrastructure, it have been proposed for applications such as traffic

coordinate

The Intelligent and mobile characteristics of the agent, the

INTRODUCTION

solution

agent

false positive rate of traditional intrusion detection system, are

The development of wireless sensor networks (WSN), offers

system,

knowledge, and the objective and strategic planning for solving

monitoring,

health

care

SURVEY OF WIRELSSE SONSOR NETWORKS SECURITY AND MOBILE AGENT

and

battlefield surveillance [1]. In any application using critical infrastructure, there is a risk of malicious attacks on this infrastructure, this attacks can used for a terrorist act or as a

A.

Wireless Sonsor Network Security Wireless

sensor

network

is

distributed

autonomous

financial gain. Security is a vital requirement in these networks

system, consist of many small devices, called sensor nodes,

and it must be established according to their constraints to can

that monitoring different environments,

solve weaknesses and vulnerabilities of these networks. In this

autonomously and they cooperate to each other and combine

they can operate

paper, we investigate how to incorporate intrusion detection

their local data to reach a global view of the operational

into wireless sensor networks, and present a new approach

environment.

based on mobiles agents to detect intrusions on WSN. A key

deployed through the environmental phenomenon which has

attraction of sensor networks is their ease of installation and

simply sensing and communicating analysis by properties.

operation. However, security is one of the key challenges to creating a robust and reliable sensor network [2]. Security is

This collection of sensor node has densely

Among the most important features a network of sensors, we cite:

faced with additional challenges due to complexities such as an

Limited life cycle: The sensor nodes are very limited by the

unreliable node operation, an unpredictable node movement

energy constraint, they usually run unattended in geographic

and a wireless access medium. These challenges make a very

remote areas. Therefore recharge or replace their batteries

important

become almost impossible [12].

potential

to

exploit

weaknesses

in

the

WSN.

Consequently, Intrusion Detection Systems (IDSs) are required

Limited Resources: Usually the sensor nodes have a very

to detect both known security exploits and even novel attacks

small size, form factor limits the amount of resources that can

or intrusions that

have

yet

to be

experienced.

Intrusion

detection is the complication of identifying misuse networks

be placed in these nodes. Accordingly, processing capacity and memory are limited [12].

and terminals [3]. Most IDSs apply signature-based techniques. In general, signature based techniques test for features of known network attacks. Consequently the question is how to

978-1-4799-4647-l/14/$31.00©2014 IEEE

Dynamic Topology: The topology of sensor networks changes

in a frequent and fast manner because the sensor nodes can be

C.

Mobile Agent A mobile agent is an autonomous entity that performs

deployed in hostile environments (ex: a battlefield), the failure

different tasks in order to achieve some goals. In the domain of

of a node sensor can be very likely. Furthermore, the sensor

networking, an agent can run even if the user disconnects from

nodes and end points where they should send the captured

the network. So mobile agents are the programs that move

information can be mobile [12].

between nodes of network, autonomously trying to achieve

Data Aggregation: In sensor networks, the data produced by

some specific goals given by users. Agents are different from

Sensor nodes are connected, which implies the existence of

other applications in that they are goal-oriented: they represent

redundancies data. A common approach is to aggregate data at

users and act on their behalf to achieve some set goals

the nodes intermediate to reduce power consumption during

autonomously, we can say they control themselves, as in the

transmission of these data [12].

decision where and when they will move to the next node.

Scalability: sensor networks generate a very large number of

Mobile agent makes adequate means of analysis efficiently and

sensors, they can reach thousands or even millions of sensors.

effectively. Mobile agent neither brings new method to detect

The challenge for the WSNs is being able to maintain their

for IDS nor increases detection speed for some kind of

performance with that many sensors [12].

attracting. Nevertheless, it improves the design, construct, and

Bandwidth Limited: Due to the limited power nodes sensors

execute of IDS clearly [6].

cannot withstand high flow rates.

Mobile agents offer very important advantages that may

Limited physical security: this is justified by the physical

constraints

and

limitations

that

minimize

the

transmitted

control data [12]. B.

Intrusion detection system in WSNs Intrusion detection system can be defined as the automatic

detection and generation an alarm to report an intrusion has occurred or is in progress. There are two approach of detection intrusion. Behavioral Approach: the observed behavior of the target

system is compared to normal and expected behavior. If the behavior of the system is significantly different from the normal or expected behavior, we say that the target system has deficiencies and is subject to an intrusion [5]. Scenarios Approach: In this approach we analyze the audit

data in search of attacks predefined scenarios in a database attack signatures [5]. In wireless sensor networks IDSs must satisfy the following properties: Local Auditing (Localize auditing): IDSs for wireless sensor

networks work with local and partial audits as in sensor networks wireless data, there is no centralized points that can collect perceivable data auditing. Minimum Resources (Minimize resources): Means that IDSs

in sensor network must use a minimum number of resources for networks without son do not have stable connections. More physical resources and network nodes such as power, energy and bandwidth are limited. Disconnection can occur at any time. Communication between nodes for detecting intrusion should therefore not take any available bandwidth. No node trust (Trust no node): IDSs in sensor networks can't

trust any node because, unlike wired networks, nodes sensors can be easily compromised. Distributed (Be truly distributed): Means that the collection

and analysis of data must be done in different locations. Moreover the distributed approach also applies to the execution of the algorithm of detection and the correlation alerts. Safe (Be secure): intrusion detection system in sensor network

should be able to withstand attacks.

overcome limitations that exist in wireless sensor network [6]: Reducing Network Load: Instead of sending huge amount of

data to the data processing unit, it might be simpler to move the processing algorithm (i.e. Agent) to the data. Overcoming Network Latency: When agents operate directly

on the host where an action has to be initiated, they can respond faster than the tree based systems that have to communicate with a central coordinator located elsewhere on the network. Autonomous Execution: When portions of the tree based

systems get destroyed or separated, it is important for the other components to remain functional. Independent mobile agents can still act and do useful work when their creating platform is unreachable which increases the fault-tolerance of the overall system. Heterogeneous

Environment:

The agent platform allows

agents to travel in a heterogeneous environment and inserts an OS independent layer. Dynamic Adoption: The mobility of the agents can be used to

reconfigure the system at run-time by having special agents move to a location where an attack currently takes place to collect additional data. Scalability: When distributed mobile agents replace a central

processing unit, the computational load is divided between different machines and the network load is reduced. This enhances scalability and additionally supports fault-resistant behavior [7]. III.

PROPOSED WORK

Different intrusion detection system for sensor network has proposed. Some of them have critical for many reasons, others are used with collaboration of routing protocols. In this paper we propose a new Intrusion Detection System based on the mobile agent which employs classification algorithms to order to perform intrusion detection in WSNs. Such algorithms have the advantages that they are largely automated, that they can be quite accurate, and that they are rooted in statistics, which explains why they are prime candidates for use in cost-sensitive classification problems. After training, they can be used for detection with matrices.

They have extended applications

including intrusion detection in wired networks [8]. In standard

experiment is the NSL-KDD dataset [9] which is a new dataset

classification problems the classification decision is selected in

for the evaluation of researches in network intrusion detection

order to minimize the probability of error. However, to detect

system. It consists of selected records of the complete KDD 99

the intrusion, we perform a thorough comparison of three well­

dataset [9]. NSL-KDD dataset solve the issues of KDD 99

known algorithms for the detection intrusion in Wireless

benchmark and connection record contains 41 features. We use

Sensor Networks (WSNs), (K-Means, Naive Bayes, and SVM).

the Weka [10] tool to implement algorithms and to perform the

A.

rate of classification.

System Architecture:

x

41285

In this section we present our new IDS based on three main mobile agents:

x x x

x

0642.5

x

o �cddeeefghhhlkllnnnnopprrsssttuuvX accdd eeffhhhiiklmnnnn rssssttuu�

Figure 2. K-Means cluster assignments

Update Database

Collector Agent: Collector Agent is the first agent to work in

the system, it collects the data from the wireless environment, store it in a file, and give it as an input to the misuse detection

n o r

x

III

agent.

x

a

1

Misuse Detection Agent: Misuse Detection Agent analyses

the data collected and captured by the collector agent. It detect the

x

known

technique

»,

attacks

in

network,

using

«misuse

detection

wcddeeefghhhlkllnnnnopprrsssttuuvX acc ddeeffhhh iikllllnnnnppprssssttuuwZ

by pattern matching algorithm, and then reports to Figure 3. Naive-Bayes Classifier errors

alert agent if there is a similarity between the captured packets and attack signatures in the database, if not, those data are given as an input to the anomaly detection agent. Anomaly Detection Agent: Anomaly Detection Agent is used

to detect the unknown attacks or intrusion by using the classification algorithm SVM. If the incoming data is detected

fI

as attack, it reports to alert agent about the attack, and updates

1

the detected attack in the database.

Y

Alert Agent: The alert agent is used to alert the system if an n

attack or intrusion occurs in the network.it.

o

IV.

A.

SIMULATION AND PLATEFORM OF IMPLEMENTATION

Simulation

x

In this simulation we improve the reason of choosing

�cddeeefghhhlkllnnnnopprr8ssttuuvX

SVM as a Classification algorithm to detect intrusion in

Bccddeeffhhhiiklmnnnnpppr�333ttuuwZ

anomaly detection agent.

We compare between the most

performing Algorithm using in anomaly technique to detect unknown

attacks

or

intrusion.

The

dataset

used

in

this

Figure 3. SVM Classifier errors

A simple way to perform intrusion detection is to use a

SVM classifier algorithm is more efficient and performing than

classifier in order to decide whether some observed traffic data

K-Means and Naive Bayes classifier with a classification rate

is normal or anormal (in the graphs above normal system on

reaching 97.4%. So we advise to use it in the IDSs, as an

blue color and anormal system on red color). The classification

algorithm for detection of new attacks, especially for the

objective is to minimize the probability of error.

anomaly detection technique. As opportunities for future work, it could be identified: the deployment of a more complex detection, with mobile agents,

Algorithm

Correctly Classified

using

Instances K-Means

91,5%

Naive Bayes

92,2%

SVM

97,4%

statistical

anomalies detection

identified by

mobile

agents and enabling the creation of attack signatures, the development of more complex detection ontology, with more parameters to characterize the attacks; the study of the impact of the use of the proposed architecture in wireless sensor network traffic, and the implementation and testing of the architecture with a redundant and fault-tolerant main container. REFERENCES

Tablel: Rate of classificatIon

[I]

c. Y. Chong and S. Kumar. "Sensor Networks: Evolution. Opportunities, and Challenges." In Proceedings of the IEEE, Vol. 39, No. 8, August 2003, pp. 1247-1256.

[2]

1. Clerk Maxwell, A. Perrig, 1. Stankovic and D. Wagner, "Security in Wireless Sensor Networks. " In Communications of the ACM, Vol. 47, No. 6, June 2004, pp. 53-57.

[3]

A Treatise on S. Snapp, 1. Brentano, G. Dias, T. Goan, L. Heberlein, C. Ho, K. Levitt, B. Mukherjee, S. Smahal, T. Grance, D. Teal, and D. Mansur, "DIDS (Distributed Intrusion Detection System) Motivation, Architecture, and An Early Prototype." In Internet besieged: countering cyberspace scoffiaws, ACM Press, 1998.

[4]

Guoxing Zhan, Weisong Shi, Deng J. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. IEEE Transactions on Dependable and Secure Computing. 2012; 9(2): 184197.

[5]

Peng Ning ,Yun Cui,and Douglas S . Reeves. Construc-ting attacks scenarios through correlation of intrusion alerts. In ACM Conference on Computer and ComminicationSecurity.pages 245-254,2002.

[6]

Y. EL MOURABIT et ai, A Mobile Agent Approach for IDS in Mobile Ad Hoc Network !JCSI International Journal of Computer Science Issues, Vol. II, Issue I, No I, January 2014, pp 148-152.

[7]

Blakley, B. : The Emperors Old Armor Proc. New Security Paradigms Wksp., 1996.

[8]

K. Lee, W. , Stolfo, SJ. , Mok, K. W. : A data mining framework for building intrusion detection models Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1999, pp.120132.

[9]

NSL-KDD Data set for Network-based Intrusion Detection Systems. Available at: nsl.cs.unb. calNSL-KDDI [accessed: July 15, 2014].

According to the results obtained we improve that the SVM classifier algorithm is more efficient than K-Means and Naive Bayes classifier with a classification rate reaching 97.4%.

Plate/arm a/ Implementation

B.

Programming WSN applications is a complex task that requires suitable programming paradigms and frameworks to cope with the WSN specific characteristics. Many of the technologies were checked like Agent development Kit (ADK), JADE [II] and Aglet Software Development Kit (IBM). These are well-known available platforms. The above mentioned technologies provide a platform for Agent development several kinds of micro and macro programming techniques have to date

been

proposed.

programming,

which

Among has

them

been

conventional distributed systems,

mobile

formerly

agent-based

introduced

for

can be more effectively

exploited in the context of WSNs. So we choose MAPS [13], Java-based framework for the development of agent-based applications for Sun SPOT platform

of

implementation,

[13] By

sensor platforms, using

MAPS,

a

as a WSN

application can be structured as a set of stationary and mobile agents distributed on sensor nodes supported by a component­ based agent execution engine that provides basic services such as agent creation, message transmission, agent cloning, agent migration, easy access to the sensor node resources, and timer handling . MAPS programming has been exemplified through a simple yet effective example that shows how to program the dynamic behavior of agents in terms of state machines on the basis of the MAPS library. It is emblematic of the effectiveness and suitability of MAPS to deal with the programming of complex applications [13]. V.

CONCLUSION AND FUTURE WORK

The proposed IDS exploits the benefits of employing mobile agents such as flexibility, increased scalability, ability to operate in heterogeneous environments, and reduced WSNs bandwidth usage.

Consequently,

we improve

that mobile

agents do provide a viable means of performing wireless sensor network security analysis as well as some other complex tasks. Also, according to the results obtained, we improve that the

[10] WEKA (2008): Data Mining Machine Learning Software [Available Online] at: cS.waikato.ac. nzlmllwekai. [II] Mosqueira-Rey, E. , Alonso-Betanzos, A. , Guijarro-Berdinas, 8., Alonso-Rios, D. , Lago-Pineiro, 1.: A Snort-based agent for a JADE multi-agent intrusion detection system In!. J. of Intelligent Information and Database Systems, 2009 Vol.3, No.1, pp. 107-121. [12] A.Delye, V. Gauthier, M. Marot, and M. Becker. State of the art networks sensors. Research Report !NT 0500IRST N-GET-TNT, UMR5157AMOVAR, National Institute of Telecommunications, Evry, France,2005. [13] F. AIELLO and al A Java-Based Platform for Programming Wireless " Sensor Network"Published by Oxford University Press on behalf of The British Computer Society. The Computer Journal, Vol. 54 No. 3, 2011

Suggest Documents