An Efficient Intrusion Detection and Prevention System with Hybrid approach

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number3 - Dec 2014
An Efficient Intrusion Detection and Prevention
System with Hybrid approach
B.Sowjanya1,B.kishor kumar2
1
1,2
Final M.Tech Student,2Assistant Professor
Dept.of IT, Aditya Institute Of Technology And Management,Tekkali. A.P
Abstract: Malicious node detection and prevention is an
endless research work because we cannot estimate all the
possible attacks and future attacks, so it is always an
interesting research issue. In this paper we are proposing an
efficient and empirical mode of node authentication
mechanism with signature and secure path can be
computed based on data rating and data can be transmitted
through Cryptographic algorithm.
Keywords : Malicious node, authentication, cryptographic
algorithm, data rating
I. INTRODUCTION
In communication system there are many issues
about intrusion detection and they are classified into two
types such as ID based intrusion detection and Host based
intrusion detection. The ID based intrusion detection
mainly works on unique ID of the users which means this
method track the intruders based on the Identity[1][2].
Another one is Host based intrusion detection and
it mainly works on the host system which means the IP
address and the port number of the system. It tracks the
users based on above parameters[3]. There are more
researches conducted in this intrusion detection concepts
based on artificial intelligence and the classification of the
data about the users.
There is some other intrusion detection techniques are
described briefly below:
File Checking:
Numerous assault systems depend on the
utilization of uncommon or twisted protocol fields, which
are erroneously taken care of by application frameworks.
Protocol check methods thoroughly check protocol fields
and conduct against built models or heuristic desires.
Information that damages the important limits is labeled as
suspicious. This methodology, utilized as a part of various
business frameworks, can catch a lot of people usually
utilized assaults, yet experiences the poor benchmarks
consistence of numerous protocol usage. [ids-List] what's
more, utilizing this strategy on exclusive or under-tagged
protocols may be troublesome or lead to false positives[4].
Immune System Approach:
Application executions characteristically give a
model of typical conduct, as application code ways. In the
resistant framework approach, applications are displayed
regarding groupings of framework requires an assortment
of distinctive conditions: ordinary conduct, mistake
ISSN: 2231-5381
conditions and endeavors. Contrasting this model with
watched occasion follows permits grouping of typical or
suspicious conduct. Case in point, a strange executive
framework bring in a web server methodology may be
demonstrative of a cradle flood attack[5][6].
Host Network Monitoring:
A methodology utilized as a part of individual
firewalls and a few IDS test plans lies in consolidating
system checking with host-based tests. By watching
information at all levels of the host's system protocol stack,
the ambiguities of stage particular activity taking care of
and the issues connected with cryptographic protocols can
be determined. The information and occasion streams saw
by the test are those seen by the framework itself.
This methodology offers preferences and burdens
like both options recorded previously. It determines a
considerable lot of the issues connected with unbridled
system checking, while keeping up the capacity to watch
the whole correspondence in the middle of victimized
person and aggressor. Like all host-based methodologies,
be that as it may, this methodology intimates an execution
effect on every observed framework, requires extra backing
to relate occasions on numerous hosts, and is liable to
subversion when the host is bargained[7].
II. RELATED WORK
In client server architecture server and client can
be divided based on the characteristics of the system.
Server can accept he request, process the request and send
the response to the requested client. Client makes request
and receives the response from the server. In mobile adhoc
networks or wireless sensor networks, source node uses
intermediate nodes for transmission of data to receiver or
destination node.
Intermediate node cannot allow the all nodes
while transmission of data, so for the verification of the
incoming node various approaches released by the various
authors from years of research, traditional approaches like
static measures (direct trust metrics, indirect trust metrics
and mutual metrics and reputation metric).
Wireless sensor networks have numerous
advantages in various places like hospitals,banks,military
and so on.Due to many important characteristicslike low
cost, more speed, reliability,but security is the majotr factor
to depend the nodes in wireless sensor networks,so due to
http://www.ijettjournal.org
Page 123
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number3 - Dec 2014
open nature mechanisms like intrusion detection system
require to identify the unauthorized node, various
approaches like classification gives good results but fails
when training data set is inconsistentor noisy data .
ALGORITHM: Node recognition
Motivation behind this current
research work is to identify the malicious node when
connects to the destination node ,so traditional approaches
are unable to identify the unauthorized nodes also mis
identifies the genuine node as malicious node, so static
results may not give optimal results,so we need a dynamic
mechanism for identification and unauthorized user and
raw log training data based result may mislead the accuracy
results, so preprocessing of training data improves the
accuracy
Step2: Master Nodeapplies signature over session key (Sk).
We can improve our work by enhancing the classification
approach, In classification based approach, analysis fails
when testing sample of data not available in training
dataset or new data sample and classification fails when
data is inconsistent or not available for specific attributes .
By improving these two features we can enhance the
performance of the current intrusion detection system
Static comparison methods may not give accurate
results.Raw firewall data decreases the performance with
duplicate log records ,for traditional Trust metrics and data
rating computations we are completely depends on Third
party and major advantages of our proposed work are
dynamic probability calculations give optimal results than
traditional static measures and Preprocessed log data
improves the efficiency and accuracy
In this paper we are introducing a hybrid approach for
malicious node detection followed by data rating
calculation for secure and optimal path and data can be
transmitted as cipher with triple DES cryptographic
algorithm
III. PROPOSED WORK
We propose a novel model of intrusion detection and
prevention technique with digital signature and average
rate of in and out data packet transmissions. Here we
categorize the server as master node(MN) and other are
general nodes(GN).A session key can be generated at MN
and applies digital signature over key which is generated at
MN and forwards the same key to all general nodes and
General node applies same signature over session key and
forwards to MN,if signature generated at MN and general
node are equal then that node is genuine node otherwise it
is malicious node.
ISSN: 2231-5381
Step1:Master Node Generates a random session Sk and
shares all connected nodes.
Step3: Individual General Node computes same hash or
signature mechanism over received Skand computes
S=[h(Sk)]
h is hash function for signature maintained by GN and MN
4) General nodesconnectsto MN for authentication with S
or [h(Sk)]
5) if S ( forwarded by GN)= S (Generated at MN)
Thenset “Genuine Node”
else
set“Malicious Node”
end if
Data rating:
After node authentication, GN can communicate with any
other genuine node by constructing the path based on data
rating which is maintained by the intermediate nodes, here
data rating can be calculated with respect to number of
packets received and number of packet delivered ratio.
Let use consider a genuine node “S” wants to transfers
some data packets to destination node “D” and E,F,G are
intermediate nodes which are used for data rating
calculation, optimal path can be computed with highest
data rating or average in and our packets ratios of the node.
The following table shows sample data rating table as
follows.
In (number of data packets
in Bytes)
30
40
25
23
45
46
Out
(number
packets in Bytes)
20
40
22
23
40
44
of
data
Data rating can be calculated with mean of in packets and
outpackets during transmission of data packets through
intermediate nodes. Data transmitted through highest data
rating basedpath of genuine or authenticated nodes for
secure data transmission from source node to destination
node, data packets can be encoded with Triple DES
cryptographic algorithm and these received data packets
can decoded only at destination end even though
transmitted through intermediate genuine nodes. The
following
algorithm
shows
triple
DES
cryptographicalgorithm as follows.
Secure Transmission:
http://www.ijettjournal.org
Page 124
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number3 - Dec 2014
Triple Des is a cryptographic algorithm for secure
transmission of data over secure channel, it converts the
plain data packets to cipher data packets or unformatted
data packets.
Triple DES runs three times slower
than DES, but is much more secure if used properly. The
procedure for decrypting something is the same as the
procedure for encryption, except it is executed in reverse.
Like DES, data is encrypted and decrypted in 64-bit
chunks. Although the input key for DES is 64 bits long, the
actual key used by DES is only 56 bits in length. The least
significant (right-most) bit in each byte is a parity bit, and
should be set so that there are always an odd number of 1s
in every byte. These parity bits are ignored, so only the
seven most significant bits of each byte are used, resulting
in a key length of 56 bits. This means that the effective key
strength for Triple DES is actually 168 bits because each of
the three keys contains 8 parity bits that are not used during
the encryption process.
The standards define three keying options:
Keying option 1: All three keys are independent.
Keying option 2: K1 and K2 are independent, and K3
= K1.
Keying option 3: All three keys are identical, i.e. K1 =
K2 = K3.
Keying option 1 is the strongest, with 3 x 56 = 168
independent key bits.
Keying option 2 provides less security, with 2 x 56 = 112
key bits. This option is stronger than simply DES
encrypting twice, e.g. with K1 and K2, because
it protects against meet-in-the-middle attacks.
For experimental analysis,we implemented our
current research work with Java, in the following example,
it shows the Malicious node detection rate with respect to
traditional approach and proposed approach, from the 100
samples of experimental data, traditional approach fails to
detect the malicious nodes and obviously it leads to
insecure data transmission between the nodes.
In proposed analysis, malicious node detection
rate is more and secure transmission can be done through
genuine nodes, so secure transmission rate is more in our
approach
100
80
60
40
20
0
ISSN: 2231-5381
Fig1 : Comparative Analysis
IV. CONCLUSION
We have been concluding our research work with efficient
malicious node detection with signature hash based
mechanism and secure and efficient path can be computed
with data rating based technique and data can be securely
transmitted
through
Triple
DES
cryptographic
algorithm,Experimental results shows more accurate and
efficient results than traditional techniques.
REFERENCES
[1] A Key-Management Scheme forDistributed Sensor
Networks,” by L. Eschenauer and V. Gligor, “Proc. Ninth
ACM Conf. Computerand Comm. Security (CCS ’02), pp.
41-47, 2002.
[2] A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D.
Culler, “SPINS:Security Protocols for Sensor Networks,”
Wireless Networks, vol. 8,no. 5, pp. 521-534, 2002.
[3] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C.
Lee, D.Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S.
Chee, “HIGHT: ANew Block Cipher Suitable for LowResource
Device,”
Proc.Eighth
Int’l
Workshop
Cryptographic Hardware and EmbeddedSystems (CHES
’06), pp. 46-59, 2006.
[4] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk,
“EnhancingSource-Location Privacy in Sensor Network
Routing,” Proc. IEEE25th Int’l Conf. Distributed
Computing Systems (ICDCS ’05), pp. 599-608, 2005.
[5] S. Hollar. COTS Dust.Master’s thesis, University of
California,Berkeley, December 2000.
[6] Internet Traffic Classification by Aggregating
Correlated Naive Bayes Predictions. By Jun Zhang,
Member, IEEE, Chao Chen, Yang Xiang,
[7], “Internet traffic classification usingbayesian analysis
techniques,” by A. W. Moore and D. Zuev
[8] SPINS: Security Protocols for Sensor Networks
ADRIAN PERRIG, ROBERT SZEWCZYK, J.D. TYGAR,
VICTOR WEN and DAVID E. CULLER
Traditional
Proposed
[9]. “Secure routing in wireless sensornetworks: Attacks
and countermeasures” .byC. Karlof and D. Wagner
.
[10] T. S. Rappaport. Wireless communications: principles
andpractice. Prentice Hall, 2nd edition, 2002.
http://www.ijettjournal.org
Page 125
Download