International Journal of Application or Innovation in Engineering & Management... Web Site: www.ijaiem.org Email: Volume 4, Issue 4, April 2015

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
Security Mechanism for Malicious Node
Detection in Ad Hoc Networks
1.
Miss. Monal M. Rathor, 2. Prof. D. M. Dakhane
1. Master of Engineering Scholar Information Technology Department
Sipna College of Engg and Technology Amravati, India
2. Associate Professor Department of Computer Science & Engg
Sipna COET, Amravati, India
ABSTRACT
The security risk of a network against unknown zero day attacks has been thought of as one thing abysmal since software
system flaws square measure less foreseeable than hardware faults and therefore the method of finding such flaws and
developing exploits looks to be chaotic. during this paper, we tend to propose a unique security metric, k-zero day safety,
supported the amount of unknown zero day vulnerabilities. By sanctioning an instantaneous comparison of various security
solutions with relation to their relative effectiveness, a network security metric might offer quantitative evidences to help
security practitioners in securing laptop networks. However, analysis on security metrics has been hindered by difficulties in
handling zero-day attacks exploiting unknown vulnerabilities. In fact, the safety risk of unknown vulnerabilities has been
thought of as one thing abysmal attributable to the less foreseeable nature of software system flaws. This causes a serious
problem to security metrics, as a result of a safer configuration would be of very little price if it were equally prone to zero-day
attacks that\'s, the metric merely counts what percentage unknown vulnerabilities would be needed for compromising a
network quality, in spite of what vulnerabilities those may well be. we tend to formally outline the metric supported Associate in
Nursing abstract model of networks and attacks. we tend to then devise algorithms for computing the metric. Finally, we tend
to show the metric will quantify several existing practices in hardening a network.
Keywords :-Security metrics, network security, attack graph, network hardening
1. INTRODUCTION
Today’s vital infrastructures and enterprises progressively suppose networked pc systems. Such systems should
therefore be secured against potential network intrusions. However, before we will improve the safety of a network, we
tend to should be able to live it, since you cannot improve what you cannot live. A network security metric is
fascinating since it\'ll give a right away menstruation of however secure a network presently is, and the way secure it
might mean introducing new security mechanisms or configuration changes. Such a capability can create the trouble of
network hardening a science instead of Associate in Nursing art. Emerging efforts on network security metrics usually
assign numeric scores to vulnerabilities as their relative exploitability or chance. The assignment is typically supported
celebrated facts regarding every vulnerability (e.g., whether or not it needs Associate in Nursing genuine user account).
However, such a strategy is not any longer applicable once considering zero day vulnerabilities regarding that we\'ve no
previous data or expertise. In fact, a serious criticism of existing efforts on security metrics is that unknown zero day
vulnerabilities square measure illimitable. First, the data a couple of software package itself is\'t possible to assist as a
result of not like hardware faults, package flaws resulting in vulnerabilities square measure celebrated to be a lot of less
sure. Second, modeling adversaries is\'t possible either, as a result of the method of finding flaws and developing
exploits is believed to be chaotic. Third, existing metrics for celebrated vulnerabilities are\'t useful, as a result of they
live the issue of exploiting a celebrated vulnerability however not that of finding a zero day vulnerability.
The incapability of measurement unknown zero day vulnerabilities will doubtless diminish the worth of security
mechanisms since Associate in Nursing aggressor will merely step outside the implementation and do as he pleases.
what\'s the worth of a safer configuration, if it\'s equally at risk of zero day attacks? we tend to therefore constitute the
agnosticism that security isn\'t quantitative till we will fix all security flaws
We propose a unique security metric, k-zero day safety, to handle this issue. rather than trying to live that zero day
vulnerability is additional possible, our metric counts what number distinct zero day vulnerabilities square measure
needed to compromise a network quality one. a bigger range can indicate a comparatively safer network, since the
chance of getting additional unknown vulnerabilities all offered at identical time, applicable to identical network, and
exploitable by identical aggressor, are going to be lower. Supported Associate in Nursing abstract model of networks
and attacks, we tend to formally outline the metric and prove it to satisfy the 3 algebraically properties of a function.
We tend to then style algorithms for computing the metric. Finally, we tend to show the metric will quantify several
existing practices in network hardening and discuss sensible problems in instantiating the model.
Volume 4, Issue 4, April 2015
Page 171
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
2. ANALYSIS OF PROBLEM
The exact algorithmic program for computing the k-zero-day safety metric given in (Wang et al., 2010) initial derives a
logic proposition of every plus in terms of exploits by traversing the attack graph backwards. every conjunctive clause
within the mutually exclusive traditional kind (DNF) of the derived proposition corresponds to a lowest set of exploits
that together compromise the plus. In fact, the authors of (Wang et al., 2010) show that the matter of computing the kzero day safety metrics is NP-hard generally, so target the answer of a a lot of sensible downside. They claim that, for
several sensible functions, it\'s going to do to understand that each plus in an exceedingly network is k-zero-day safe for
a given price of k, despite the fact that the network could essentially be k0-zero-day safe for a few unknown k0 > k
(note that determinative k0 is intractable). Then, they describe an answer whose quality is polynomial within the size of
a zero-day attack graph if k could be a constant compared to the present size. However, there square measure cases
within which it\'s not satisfactory to only recognize k0 > k, however a lot of correct estimations or precise calculation of
the worth of k is desired. Moreover, those analyses square measure all supported complete zero-day attack graphs,
except for extremely giant networks, it\'s going to even be impracticable to get the zero-day attack graph within the
initial place. The metric then becomes impractical in such cases since there\'s very little we are able to say regarding
the worth of k. The same intractableness result suggests that no polynomial algorithmic program can seemingly exist
for computing the precise price of k. However, during this section we tend to show that a choice method should still
enable security directors to get smart estimations regarding k, and to calculate the precise price of k once it\'s much
possible. Our main objectives square measure threefold.
First, all the algorithms concerned within the call method are economical and have polynomial quality. Second, all the
algorithms can adopt associate on demand approach to attack graph generation, which can solely generate partial attack
graphs necessary for the analysis. Third, succeeding algorithms can apply the partial attack graph already generated
earlier within the call method, so any up the potency. With those optimizations, we are able to give an improved
understanding of zero-day vulnerabilities even for comparatively giant networks.
Specifically, in most sensible eventualities, security directors could merely wish to assess whether or not the network or
specific assets square measure secure enough. In such cases, knowing that k is larger than or up to a given bound l
could also be adequate. However, once it\'s been confirmed that k > l, a security administrator might want to understand
whether or not it\'s potential to cipher the precise price of k. Since the matter of computing the precise price of k is
defiant, this could solely be potential for comparatively little values of k. Therefore, we\'d like to estimate whether or
not k is a smaller amount than a sensible bound that represents obtainable procedure power. Finally, if this is often true,
then we are able to proceed to calculate the particular price of k in associate economical manner. Within the following,
we tend to finalize the 3 connected issues that form the idea of the higher than call method.
3. IMPLEMENTATION
3.1 Definition 1: Zero-Day Exploit : We define two types of zero-day exploits, for each remote service S, we define a
zero-day vulnerability Vs such that the zero-day exploit hvs, h, h0i has three pre-conditions, hs, h0i (existence of
service), hh, h0i (connectivity), and hp, hi (attacker’s existing privilege); this zero-day exploit has one post-condition
hp0, h0i where p0 is the privilege of service S on h0. for each privilege p, we define a zero-day vulnerability Vp such
that the zero-day exploit hvp, h, hi has its pre-conditions to include all privileges of remote services on h, and its postcondition to be p on h. We use E0 and C0 to denote the set of all zero-day exploits and the set of all their pre- and postconditions respectively, and we extend the functions pre() and post() accordingly.
3.2 Definition 2: Zero-Day Attack graph: Given an attack graph
, a set Eo of zero-day exploits, a
set Co of pre and post-conditions of exploits in Eo, a zero-day attack graph G* is the directed graph
3.3 Propose algorithm
Following are the steps which be used for implementation
Setp1: Nodes are divided into three categories; base station, cluster head and member nodes. Some arbitrary nodes are
selected as cluster heads and generation of cluster heads is left to the clustering mechanism (not dealt in this work).
Each cluster head knows about its member nodes, while every member node knows its cluster head. Base station stores
information of all sensor nodes (including cluster heads). The base station maintains complete topological information
about cluster heads and their respective members. • Base station is powerful enough and cannot be compromised like
other nodes of the network.
Step2: For deploying the nodes in the network, we generate a unique fingerprint for each sensor node. It addressed by
combining relative nodes information through a superimposed s-disjunct code and this is preloaded in each node. Due
to this each node seems unique from other one. Basically this fingerprint remains secret throughout the process.
Volume 4, Issue 4, April 2015
Page 172
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
Step3: A public key N generation by the base station is done after the deployment. Basically this key is used by any two
nodes at a given time while communicating. Here base station is third party whereas sender node is prover and
receiving node verifier. Each node is assigned a fingerprint which is used as a private key (secret key). Prover and
receiver share the public key. Now from base station secret key of the prover from the base station is requested by
verifier. The base station will generate a secret code v = s2modN (where s is finger print of the prover and N is the
public key). The value of v is given to the verifier on its request [13].Fingerprint is never shown or transmitted in the
network directly during this entire communication process. By using ZKP for k times per communications verifier will
continues the authentication process which includes number of verification rounds. Failure of prover for authentication
of itself in any one of the k rounds, then it becomes a compromised node. For more effectiveness of protocol it must be
passed through large number of rounds. The number s remains private within the domain of the prover. Thus makes it
computationally infeasible to derive s from v given
v = s2modN
S = finger print of prover
N = public key
In our model, the finger print of a node never gets transmitted and thus intruder not haves chance to identify them.
Even if the attacker tries to generate a finger print in some brute force method, it will not be able to escape the check as
every time a new public key N and a new random challenge question will be used. In this attack, an intruder tries to
replay the earlier Communication and authenticate itself to the verifier. But, with our model verifier will be sends
different values each and every time in communication, replaying earlier communication.
Fig.1 Adhoc base communication
In above fig there is 0 to 50 nodes are available in the adhoc network. Here node 0 is source node and node 50 is
destination node. In orange color node is the sending path for communication from source to destination. In red color
node are the malicious node and its drop the packet from given path. And in blue color node there is mutual
communication for securing path for sending data.
Public Key = O(n)
4. RESULTS GRAPH
"Energy " are used to describe the relationship between energy output of a system and the energy inputs needed to
operate it. XGRAPH is a general purpose x-y data plotter. Xgraph can be used to plot the bandwith of given nodes
through the adhoc network.
Energy: ER = Eo / Ei
Eo = energy output
Ei = energy input
Graphs will be shown of Energy consume between each node to data transfer.
Volume 4, Issue 4, April 2015
Page 173
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
Energy Comparison graphs In Attack (red color) and In Defense (green)
Throughput
In computer technology, throughput is the amount of work that a computer can do in a given time period. In computer
networks, good put is the application level throughput, i.e. the number of useful bits per unit of time forwarded by the
network from a certain source address to a certain destination
Transmission
Time
=
File
Size
/
Bandwidth
(sec)
Throughput = File Size / Transmission Time (bps)
Throughput comparison graph In Attack (red color) and In Defense (green)
5. CONCLUSION
We proposed a new security model to address Vulnerability. We used the concept of zero knowledge protocol which
ensures non-transmission of crucial information between the prover and verifier. The proposed model uses finger print
based on s-disjunct code together with ZKP to detect Vulnerability and avoid Vulnerability.
REFERENCES
[1] P. Ammann, D. Wijesekera, and S. Kaushik, “Scalable, Graph- Based Network Vulnerability Analysis,” Proc.
Ninth ACM Conf. Computer Comm. Security (CCS ’02), pp. 217-224, 2002.
[2] D. Balzarotti, M. Monga, and S. Sicari, “Assessing the Risk of Using Vulnerable Components,” Proc. ACM
Second Workshop Quality of Protection (QoP ’05), pp. 65-78, 2005.
[3] S.M. Bellovin, “On the Brittleness of Software and the Infeasibility of Security Metrics,” IEEE Security and
Privacy, vol. 4, no. 4, p. 96, July/Aug. 2006.
[4] M. Dacier, “Towards Quantitative Evaluation of Computer Security,” PhD thesis, Institut Nat’l Polytechnique de
Toulouse, 1994.
[5] E.W. Dijkstra, “A Note on Two Problems in Connection with Graphs,” Numerische Mathematik, vol. 1, pp. 269271, 1959.
Volume 4, Issue 4, April 2015
Page 174
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 4, April 2015
ISSN 2319 - 4847
[6] J. Doob, Measure Theory. Springer-Verlag, 1994.
[7] C. Dwork, “Differential Privacy,” Proc. 33rd Int’l Colloquium Automata, Languages and Programming (ICALP
’06), vol. 2, pp. 1-12, 2006.
[8] N. Falliere, L.O. Murchu, and E. Chien, “W32.Stuxnet Dossier,” Symantec Security Response, 2011.
[9] M. Frigault, L. Wang, A. Singhal, and S. Jajodia, “Measuring Network Security Using Dynamic Bayesian
Network,” Proc. Fourth ACM Workshop Quality of Protection (QoP ’08), 2008.
[10] A. Greenberg, “Shopping for Zero-Days: A Price List for Hackers’ Secret Software Exploits,” Forbes, Mar. 2012.
[11] H. Holm, M. Ekstedt, and D. Andersson, “Empirical Analysis of System-Level Vulnerability Metrics through
Actual Attacks,” IEEE Trans. Dependable Secure Computing, vol. 9, no. 6, pp. 825- 837, Nov. 2012.
[12] J. Homer, X. Ou, and D. Schmidt, “A Sound And Practical Approach to Quantifying Security Risk in Enterprise
Networks,” technical report, Kansas State Univ., 2009.
[13] N. Idika and B. Bhargava, “Extending Attack Graph-Based Security Metrics and Aggregating Their Application,”
IEEE Trans. Dependable and Secure Computing, vol. 9, no. 1, pp. 75-85, Jan./Feb. 2012.
[14] K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer, “Modeling Modern Network Attacks and
Countermeasures Using Attack Graphs,” Proc. Ann. Computer Security Applications Conf. (ACSAC ’09), pp.
117-126, 2009.
[15] S. Jajodia, S. Noel, and B. O’Berry, “Topological Analysis of Network Attack Vulnerability,” Managing Cyber
Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, and A. Lazarevic, eds., Kluwer Academic,
2003.
[16] A. Jaquith, Security Merics: Replacing Fear Uncertainity and Doubt. Addison Wesley, 2007.
[17] S. Jha, O. Sheyner, and J. Wing, “Two Formal Analysis of Attack Graph,” Proc. 15th Computer Security
Foundation Workshop (CSFW’ 02), 2002.
[18] D. Leversage and E. Byres, “Estimating a System’s Mean Time-to- Compromise,” IEEE Security and Privacy, vol.
6, no. 1, pp. 52-60, Jan./Feb. 2008.
[19] W. Li and R.B. Vaughn, “Cluster Security Research Involving the Modeling of Network Exploitations Using
Exploitation Graphs,” Proc. IEEE Sixth Int’l Symp. Cluster Computing and Grid (CCGRID ’06), p. 26, 2006.
[20] R. Lippmann, K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham, “Validating and
Restoring Defense in Depth Using Attack Graphs,” Proc. IEEE Conf. Military Comm. (MILCOM’ 06), pp. 981990, 2006.
[21] J. McHugh, “Quality of Protection: Measuring the Unmeasurable?” Proc. ACM Second Workshop Quality
Protection (QoP ’06), pp. 1-2, 2006.
AUTHOR
Prof. Dhanajay D. Dakhane Associate Professor Department of Computer Science and Engineering Sipna
College of Engineering And Technology, Amravati, India.
Miss. Monal M. Rathor Master of Engineering Scholar Information Technology Department Sipna
College of Engg and Technology Amravati, India
Volume 4, Issue 4, April 2015
Page 175
Download