International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 4- Jan 2014 Detect, Localize and Estimate the number of Spoofing Attackers in Wireless Network Deepthy Mary Mathai#1 T. K Parani*2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor, dept. Electronics &Communication Engineering DSCE Coimbatore, India Abstract— Wireless Networks collect and disseminate data from the fields where ordinary networks are unreachable.Wireless network system is prone to various types of attacks. Various attacks are Eavesdropping, DoS, Spoofing, etc. Among the common attacks, spoofing attacks has large impact on system’s security. Conventional methods using cryptography introduces overhead problems. Spoofing Attacks can be launched with little effort as the wireless medium is shared. Spoofing attack affect the system performance. Spoofing attack on mobile wireless devices may inflict security and privacy damages on social life of Spoofing are also called IP address Forgery. In the context of network security, a spoofing Attack is a situation which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. In this project SILENCE mechanism is used to find number of attackers. GADE technique is used to find presence of attacker in wireless network. IDOL system is to localize attackers. Simulation is performed in Network Simulator. Keywords--- wireless networks, Spoofing Attacks, GADE, SILENCE, IDOL, IP address Forgery, cryptography I. INTRODUCTION A wireless network uses wireless network connection. It eliminates the costly process of laying cables into any building like homes, telecommunication network. Wireless network uses Radio waves to connect devices such as laptops to the internet. Wireless medium is open.A wireless network is a system for connecting a computer to a network without the use of cabling. In its simplest form it consists of a computer with a wireless card and a wireless router [1].Wireless Network enables computers to be connected without the use of cabling to a server, hub or switch. Various types of attacks can affect wireless networks. Wireless Networks are prone to many types of attacks and exploitation. Spoofing attacks are common types of attacks. Spoofing Attacks can be launched with little effort as the wireless medium is shared. Spoofing attack occurs when a malicious party impersonates another device or user on a network in order to launch attacks against ISSN: 2231-5381 network hosts, steal data, spread malware, or bypass access controls. Many conventional techniques were used to prevent spoofing attack. Conventional methods were used also to determine which node is being affected. Main disadvantage of conventional method is overhead requirement & it doesn’t have ability to localize the positions of the adversaries after attack detection. Spatial information is a physical property associated with each node. This spatial information is used for: 1) Determining spoofing attack 2) Determining number of attackers 3) Localize Multiple Adversaries Various spoofing attack detection methods are used.Existing methods for detecting spoofing attacks involves cryptographic schemes. Application of cryptographic schemes requires reliable key distribution, management, and maintenance mechanisms. Cryptographic methods cannot be applied because of it’s infrastructural, computational, and management overhead. Cryptographic methods are susceptible to node compromise, which is a serious concern as most wireless nodes are easily accessible, allowing their memory to be easily scanned. Spatial correlation is used to detect spoofing attacks and it will not require any additional cost or modification to the wireless devices themselves [12]. II. METHOD USED Three main methods are used: 1) GADE 2) SILENCE 3) IDOL GADE is a generalized attack detection model. GADE can both detect spoofing attacks using cluster analysis methods grounded on RSS-based spatial correlations among normal devices and adversaries. In this method it is possible to use http://www.ijettjournal.org Page 173 International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 4- Jan 2014 the uniqueness of spatial information, but cannot use location directly as the attackers’ positions are unknown. Received signal strength (RSS) is a property closely correlated with location in physical space and is readily available in the existing wireless networks. This property is not based on cryptography. RSS is used as the basis for detecting spoofing attack. Although affected by random noise, environmental bias, and multipath effects, the RSS measured at a set of landmarks (i.e., reference points with known locations) is closely related to the transmitter’s physical location and is governed by the distance to the landmarks. The RSS readings at the same physical location are similar, whereas the RSS readings at different locations in physical space are distinctive. Thus, the RSS readings present strong spatial correlation characteristics. RSS value vector is defined as s= {s1,s2,....sn }where n is the number of landmarks/access points that are monitoring the RSS of the wireless nodes and know their locations. Generally, the RSS at the ith landmark from wireless node is log normally distributed, si(dj) [dBm] =p(d0 )[dBm] – 10γlog(di/dj) + Xi Where p(d0 )represents the transmitting power of the node at the reference distance, d0,djis the distance between the wireless node j and the ith landmark. Xi is the shadow fading which follows zero mean Gaussian distribution. ROC curves shift to the upper left when increasing the distance between two devices. This indicates that the farther away the two nodes are separated, the better detection performance that this method can achieve. This is because the detection performance is proportional to the non centrality parameterλ,which is represented by the distance between two wireless nodes together with the landmarks. Detection performance of the approach is investigated under RSS variations. The distance is fixed between two wireless devices as 25 feet. The obtained ROC curves when the standard deviation of shadowing is set to 2, 3, and 4 dB, respectively. Better detection performance is obtained with lower standard deviation of shadowing. A larger standard deviation of shadowing causes the two distributions, i.e., non-central chi-square and central chisquare, to get closer to one another. The smaller standard deviation of shadowing results in a better detection performance. SILENCE testing is SILhouette Plot and System EvolutioN with of cluster, which evaluates the minimum distance between clusters on top of the pure cluster analysis to improve the accuracy of determining the number of attackers. The number of attackers K in SILENCE is thus determined by K= Ksp if Ksp= Ksec K= Ksp if min ( Dm) Ksp> min (Dm)Ksec K= Ksec if min ( Dm)Ksp< min (Dm)Ksec. ISSN: 2231-5381 K is the observed value of Dm between two clusters. SILENCE takes the advantage of both Silhouette Plot and System Evolution and further makes the judgment by checking the minimum distance between the returned clusters to make sure the clusters are produced by attackers instead of RSS variations and outliers. Hence, when applying SILENCE to the case SILENCE returns K = 3 as the number of attackers, which is the true positive in this example. Inaccurate estimation of the number of attackers will cause failure in localizing the multiple adversaries. It’s not known that how many adversaries will use the same node identity to launch attacks, determining the number of attackers becomes a multiclass detection problem and is similar to determining how many clusters exist in the RSS readings. If C is the set of all classes, i.e., all possible combination of number of attackers. For instance, C={ 1,2,3,4}. For a class of specific number of attackers ci, e.g., ci= 3, Pi as the positive class of ci and all other classes (i.e., all other number of attackers) as negative class Ni, Pi=ci IDOL: Integrated Detection and Localization Framework is used localize multiple adversaries. The experimental results are presented to evaluate the effectiveness of our approach, especially when attackers using different transmission power levels. The traditional localization approaches are based on averaged RSS from each node identity inputs to estimate the position of a node. In wireless spoofing attacks, the RSS stream of a node identity may be mixed with RSS readings of both the original node as well as spoofing nodes from different physical locations [3]. The traditional method of averaging RSS readings cannot differentiate RSS readings from different locations and thus is not feasible for localizing adversaries. Different from traditional localization approaches, integrated detection and localization system utilizes the RSS medoids returned from SILENCE as inputs to localization algorithms to estimate the positions of adversaries. The return positions from our system include the location estimate of the original node and the attackers in the physical space. RADAR-gridded algorithm is used. The RADARGridded algorithm is a scene-matching localization algorithm. RADAR-Gridded uses an interpolated signal map, which is built from a set of averaged RSS readings with known (x,y) locations. Given an observed RSS reading with an unknown location, RADAR returns the x, y of the nearest neighbour in the signal map to the one to localize, where “nearest” is defined as the euclidean distance of RSS points in an N-dimensional signal space, where N is the number of landmarks[3]. http://www.ijettjournal.org Page 174 International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 4- Jan 2014 III. RESULTS After simulation results can be shown in network animator window. Figure 3 : Graph shows that number of attackers increases with time. In any network number of attackers increases with time and it will be difficult to prevent the attack. The Precision of the case of three attackers is lower than the cases of two and four attackers. This is because the cases of two attackers and four attackers are likely to be mistakenly determined as the case of three attackers. Figure 1 : Network Animator window showing different Nodes. Figure 4: Comparison of Localization Errors using Medoids from Cluster Analysis and using Averaged RSS Figure 2 : Network Animator window showing malacious node ISSN: 2231-5381 Conduct cluster analysis on top of RSS-based spatial correlation to find out the distance in signal space and further detect the presence of spoofing attackers in physical space. Under normal conditions, the test statistic Dm should be small since there is basically only one cluster from a single physical location. However, under a spoofing attack, there is more than one node at different physical locations claiming the same node identity. As a result, more than one cluster will be formed in the signal space and Dm will be large as the medoids are http://www.ijettjournal.org Page 175 International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 4- Jan 2014 derived from the different RSS clusters associated with different locations in physical space [1]. operation throughout the completion of the paper. I deeply express my gratitude to all the ECE department staffs for their valuable advice and co-operation. REFERENCES Figure 5: Dm for the 802.11 network when the spoofing attacker used transmission power of 10dB to send packets If a spoofing attacker sends packets at a different transmission power level from the original node, based on cluster analysis there will be two distinct RSS clusters in signal space (i.e., Dm will be large).Transmission power for an attacker is varied from 30 mW (15 dBm) to 1 mW (0 dBm). It is found that in all cases Dm is larger than normal conditions. Figure presents an example of the Cumulative Distribution Function of the Dm for the 802.11 network when the spoofing attacker used transmission power of 10dB to send packets,. Whereas the original node used 15 dB transmission power level. From the curve of D m under the different transmission power level shifts to the right indicating larger Dm values. IV. CONCLUSION Received signal strength based spatial correlation is used to detect attack. It is a physical property associated with each wireless device that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks in wireless networks. Theoretical analysis is provided of using the spatial correlation of RSS inherited from wireless nodes or attack detection. The test statistics based on the cluster analysis of RSS readings. This approach can detect the presence of attacks as well as determine the number of adversaries, spoofing the same node identity, so that it is possible to localize any number of attackers and eliminate them. [1]Chandrasekaran.G,Francisco.J,Ganapathy. V,Gruteser.M, Trappe.W(2009),‘Detecting Identity Spoofs in IEEE 802.11e Wireless Network’ IEEE GLOBECOM. [2] Chen.Y, Trappe.W, and Martin.R.P, (2007), “Attack Detection in Wireless Localization,” Proc.IEEE INFOCOM, Apr. 2007.(SECON) [3]Chen.Y, Trappe.W, and Martin. R.P, ‘Detecting and Localizing Wireless Spoofing Attacks,’Proc. Ann.IEEE Comm. Soc.Conf. Sensor,(2006)Mesh and Network.. [4] Faria.D and Cheriton.D,(2006), ‘ Detecting Identity-Based Attacks in Networks Using Signa lprints’ Proc.ACM Workshop Wireless Security [5]Ferreri.F, Bernasch.M, and Valcamonic.L,(2004), ‘Access Points Vulnerabilities to Dos Attacks in 802.11 Networks ,’Proc .IEEE Wireless Comm. and Networking Conf. [6]Li.Q and Trapp.W, (2006), ‘Relationship-Based Detection of Spoofing-Related Anomalous Traffic in Ad Hoc Networks,’Proc. Ann. IEEE Comm. Soc. on IEEE Conf. [7] Li.Q and Trappe.W, (2007),‘ Detecting Spoofing and Anomalous Traffic in Wireless Network via Forge Resistant Relationships ’IEEE transactionson information and security, Vol. 2. [8] Madigan.D, Elnahrawy.E , R. Martin, Ju.W, Krishnan.P, and Krishnakumar (2005), ‘Bayesian Indoor Positioning Systems’, Proc. IEEE INFOCOM, pp.324-331. [9] Sheng.Y, Tanand .K ,Campbell.A,(2008), ‘Detecting 802.11MAC Layer Spoofing Using Received Signal Strength’,Proc. IEEE Infocom. [10] Wang.K ,(2007), ‘Estimating the Number of Clusters via System Evolution forCluster Analysis of Gene Expression Data’, Technical Report NO. 2007-258,Computer Science Dept., Xidian Univ., P.R. China. [11] Xiao.L, Greenstein L.J, Mandayam N.B, and W. Trappe, (2007), ‘Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication,’ Proc. IEEE Int Conf.Comm. (ICC), pp. 4646-4651. [12] Yang.J, Chen.Y, and Trappe.W, (2009), ‘Detecting Spoofing Attacks in Mobile Wireless Environments,’ Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mes and Ad Hoc Comm. and Networks (SECON). [13] Yang.z,Ekici.E, and Xuan.D,(2007), ‘A Localization-Based Anti-Sensor Network System’, Proc. IEEE INFOCOM, pp. 23962400. [14] Z. Yang, E. Ekici, and D. Xuan, (2007), ‘A Localization-Based Anti-Senso Network System’, Proc. IEEE INFOCOM, pp. 23962400. [15] Zhou.G , He.T, Krishnamurthy.S , and Stankovic.J.A (2006) , ‘Modelsand Solutions for Radio Irregularity in Wireless Sensor Networks’, ACM Trans. Sensor Networks, Vol. 2, pp. 221-262. ACKNOWLEDGMENT I,DEEPTHY MARY MATHAI, student of M.E COMMUNICATION SYSTEMS, Dept. of ECE, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. I would like to thank Asst. Prof. Ms.T.K..PARANI for her encouragement and constant co- ISSN: 2231-5381 http://www.ijettjournal.org Page 176