Cho-TR10-slide

advertisement
Effect Of Intrusion Detection on
Reliability of Mission-Oriented Mobile
Group Systems in Mobile Ad Hoc
Networks
Author: J.H. Cho, I.R. Chen and P.G. Feng
IEEE Transactions on Reliability,
Vol. 59, No. 1, 2010, pp. 231-241.
[P1] (4/6 - Presented by R. Mitchell, C. Jian, and A.H. Saoud)
Outline


•
•
•
•
2
Introduction (A.H. Saoud)
System Model (A.H. Saoud)
Performance Model (R. Mitchell)
Parameterization (R. Mitchell)
Numerical Results, and Analysis (C. Jian)
Applicability & Conclusion (C. Jian)
Introduction
• Analyzing the effect of intrusion detection
system (IDS) techniques on the reliability of a
mission-oriented group communication in
mobile ad hoc networks.
• Knowing design conditions for employing
intrusion detection system (IDS) techniques
that can enhance the reliability, and thus
prolong the lifetime of GCS.
• Limitations.
• Techniques (prevention, detection, recovery).
3
Introduction
• Applying model-based quantitative
analysis to security analysis.
• MTTSF is a measure to reflect the
expected system lifetime, representing
a measure against loss of service
availability, or system integrity.
• Identify the optimal rate at which IDS
should be executed to maximize the
system lifetime.
4
Introduction
• Consider the effect of security threats, and
counter IDS techniques on system lifetime of
a mission-oriented GCS in MANETs.
• Mathematical models to identify the optimal
intrusion detection rate at which MTTSF is
maximized through analyzing the tradeoff
between positive and negative effects of IDS.
• Show that the analysis methodology
developed is generally applicable to varying
network conditions.
5
System Model
• The notion of a mobile group is defined based
on “connectivity.”
• The GCS, and its constituent mobile groups
are “mission-oriented”
• Mission execution is an application-level goal
built on top of connectivity-oriented group
communications.
•  leave rate,  rejoin rate, Mobility rate 
/( + ) probability node is in any group
 /( + ) probability node is not in any group
6
System Model - Confidentiality
• Shared symmetric (group) key for secure group
communications, to encrypt the message sent by a
member to others in the group for confidentiality.
• Rekeying upon group member join/leave/eviction, or
group partition/merge events to preserve secrecy.
• Group Diffie-Hellman (GDH), a contributory key
agreement protocol, used for group key rekeying for
decentralized control, and to eliminate a single point
of failure.
• Identify optimal intrusion detection intervals to
maximize MTTSF, leading to improved service
availability.
7
System Model - Authentication
• Each member has a private key, and public
key, available for authentication.
• The public keys of all group members
preloaded into every node.
• No certificate authority (CA), or key
revocation. A node’s public key therefore
serves as the identifier of the node
8
System Model - IDS
• Host-based IDS, each node performs local
detection to determine if a neighboring node
has been compromised.
• The effectiveness of IDS techniques applied: the
false negative probability (P1), and false positive
probability (P2).
• Voting-based IDS:
• m nodes each preinstalled with host-based IDS
• -ve (a) evicting good nodes by always voting “no”
to good nodes (b) keeping bad nodes in the
system by al- ways voting “yes” to bad nodes.
9
System Model –IDS Tolerance
• False negative probability, and false positive
probability. Calculated based on
•
(a) the per-node false negative, and positive probabilities of host-based IDS
in each node; (b) the number of vote-participants selected to vote for or
against a target node. (c) an estimate of the current number of
compromised nodes
• For the selection of participants, each node
periodically exchanges its routing information,
location, and identifier with its neighboring nodes.
10
System Model – Tolerance 2
• With respect to a target node, all neighbor
nodes that are within a number of hops from
the target node are candidates as voteparticipants.
• A coordinator is selected randomly by
introducing a hashing function that takes in
the identifier of a node concatenated with the
current location of the node as the hash key.
• The node with the smallest returned hash
value would then become the coordinator
11
System Model – Tolerance 3
• Coordinator selects m nodes randomly and
broadcasts the list of m nodes.
• Any node not following the protocol raises a
flag as a potentially compromised node, and
may get itself evicted when it is being
evaluated as a target node.
• The vote-participants are known to other
nodes, and based on votes received, they
can determine whether or not a target node is
to be evicted.
12
System Model – Failure Def
• System Failure Definition 1 (SF1), which
is when the GCS fails when any mobile
group fails;
• System Failure Definition 2 (SF2), which
is when the GCS fails when all mobile
groups fail.
• Evaluation of the effect of the two
system failure definitions on the MTTSF
of the system.
13
System Module – Failure Con.
• Condition 1 (C1): undetected member
requests and obtains data using the group
key. (leading to the loss of system integrity
• Condition 2 (C2):more than 1/3 of group
member nodes are compromised, but
undetected by IDS. This failure condition
follows the Byzantine Failure model (loss of
availability of system service).
14
System Model - Connectivity
• Single hop, single group, not experiencing
group merge or partition events.
• SF1 and SF2 are the same.
• Multi-hops so that there are multiple groups in
the system due to group partition/merge.
15
System Module – Reliability
• MTTSF: indicates the lifetime of the
GCS before it fails.
• A GCS fails when one mobile group fails,
or when all mobile groups fail in the
mission-oriented GCS, as defined by SF1
or SF2.
• a mobile group fails when either C1 or C2
is true.
• A lower MTTSF implies a faster loss of
system integrity, or availability.
16
Outline
•
•


•
•
17
Introduction (A.H. Saoud)
System Model (A.H. Saoud)
Performance Model (R. Mitchell)
Parameterization (R. Mitchell)
Numerical Results, and Analysis (C. Jian)
Applicability & Conclusion (C. Jian)
Performance Model
•
•
•
•
18
SPN
Places
Transitions
Review
19
Places
•
•
•
•
groups NG
uncompromised members Tm
undetected compromised nodes UCm
evicted nodes DCm
• well detected compromised
• false detected uncompromised
• security failure GF
• absorbing
20
Transitions
•
•
•
•
•
group partition TPAR
group merge TMER
member compromise TCP
false detection TFA
confidentiality violation (C1) TDRQ
• rate = λq · mark(UCm) · p1
• well detection TIDS
• rekey TRK
21
Review
• Why is TDRQ rate scaled by p1?
• Where is the Byzantine failure (C2)
transition into GF?
• TBYZ from UCm with multiplicity mark(Tm) / 2
• Derive SF2 reward model
22
Parameterization
•
•
•
•
23
TRK rate
TCP rate
IDS interval δ
Pfp and Pfn
TRK rate
• For one group:
• bGDH / datalink rate
• For multiple groups:
• 3bGDH(N-1) / datalink rate
24
TCP rate
• adversary becomes more aggressive
when they have the upper hand
• λc · (mark(Tm) + mark(UCm) / mark(Tm))
25
IDS interval δ
• IDS becomes more aggressive as it
detects more compromised nodes
• (TIDS)-1 · (Ninit / (mark(Tm) + mark(Ucm))
26
27
Outline
•
•
•
•


28
Introduction (A.H. Saoud)
System Model (A.H. Saoud)
Performance Model (R. Mitchell)
Parameterization (R. Mitchell)
Numerical Results, and Analysis (C. Jian)
Applicability & Conclusion (C. Jian)
Parameterization & Metric
MTTSF
IDS interval (TIDS)
29
Single-hop 5s - 1200s
SF1=SF2
Multi-hop 5s - 1200s
SF1, SF2
# of vote-participants (m)
3,5,7
group communication rate q
1/30s 1/1min 1/2min 1/4min
1/8min
base compromising rate c
1/3h 1/6h 1/12h 1/d 1/2d
Tids on MTTSF under m (1)
• Optimal TIDS
• increasing MTTSF as TIDS
increases, negative effects of IDS
are mostly due to false positives
• decreasing MTTSF as TIDS
increases, more compromised
nodes will remain in the system
30
Tids on MTTSF under m (2)
• large m reduce the possibility of
collusion by compromised nodes,
thus get high MTTSF,
• small m , the false alarm
probability is relative large,
resulting in a small MTTSF
31
Tids on MTTSF under m (3)
• MTTSF in single-hop is
comparatively higher than that in
multi-hop due to the difference of
node density (adverse effect)
• MTTSF under SF2 > MTTSF
under SF1
32
Sensitivity of MTTSF on q(1)
•
q is low, a high MTTSF, q is high, a
low MTTSF
•
•
•
33
depends on the frequency of data-leak attack
q increases, optimal TIDS becomes
smaller
the adverse effect of false positives
dominates when TIDS is sufficiently small
Sensitivity of MTTSF on q(2)
•
•
34
Optimal TIDS in single-hop < Optimal
TIDS in multi-hop, because single-hop
need to perform IDS more frequently to
prevent potentially more compromised
nodes
MTTSF under SF2 > MTTSF under SF1
Sensitivity of MTTSF on c (1)
• IDS is more effective when c
is sufficiently low
35
Sensitivity of MTTSF on c (2)
•
•
36
single-hop MANETs have higher MTTSF
because more members exist in singlehop MANETs
the optimal TIDS is smaller in single-hop
MANETs under identical conditions
because the system tends to execute
IDS more frequently
Conclusion
• a mathematic model
• input: operational conditions, system failure
definitions, attacker behaviors
• output: the optimal rate to execute intrusion
detection to enhance the system reliability
of GCS
• results
• TIDS , as m, node density  or group
size , q  c 
37
Questions?
Download