1606356778

advertisement
Detection and Elimination of Unauthorized Hosts
using MA based WIPS
Hitesh Thawani1, Vivek Waykule2, Geetsagar Pagare3, Saket Raut4, Shashi Athawale5
Computer Department,
AISSMS, College of Engineering,
Pune, Maharashtra, India
progrp@ymail.com1
attacks has been said to be emerged in past few years.
Abundance of wireless technologies has enabled attackers to
enter networks. Using simple, free software, a new breed of
adversaries is able to locate wireless networks, eavesdrop on
ongoing communications, and resources in the Network.
With the proper antenna, the attack can come from far away.
Thus detection and identification of the intruder presents
exclusive challenges which render many conventional
intrusion detection techniques ineffective. Data security is
biggest concern for network administrators while
implementing WLAN. In a WLAN it is impossible for the
Access Point to detect the location of intruder. Considering
the college situation Intruder could be in lobby, or in class
room, or in laboratory, or in library, or in the car parked just
outside the gate of college. Data passing across unreliable
radio link could lead to spoofing. According to a study rogue
APs are present on about 40% of all enterprise networks. The
key reason is advancements in hardware and software have
made AP installation, AP discovery, and AP compromise an
effortless task for intruders. It is handy to obtain an AP and
Keywords— Intrusion, Intelligent Mobile Agents (MA), Rouge
plug into a network without being discovered for some time.
Access Point, Unauthorized Host, Wireless LAN (WLan).
Moreover, Wi-Fi network cards have the capability to capture
all 802.11 transmissions. This has led to increase in the
I. INTRODUCTION
process of driving around and looking for vulnerable APs
We are living in era of convergence. Convergence is (war-driving activities). Intrusion Detection Systems (IDSs)
synergistic integration of various technologies of different are a key line of defence for protecting network resources
domain and discrete Information technology (IT) from illegal penetrations [5].The shortcomings in the current
systems .Wireless Local Area Network (WLAN) is most security standards have led to a new breed of security
rapidly growing networking technology in this era due to its products known as Intrusion Prevention Systems (IPS). An
immense advantages [9]. Access to the WLAN is made using Intrusion Prevention System is a network device/software
the Hotspot or Access Points. Least expensive, high data rates, that goes deeper than a firewall to identify and block network
easy installation, mobility, productivity, flexibility, handiness, threats.So the main theme of our paper is to provide an
constant connections and easy extensions are some of the efficient and reliable approach to detect and eliminate
plus points of WLAN technology. Transmission & receiving unauthorized communication links which compromise the
of data is done through high frequency radio waves over security and confidentiality of wireless Networks and tackle
range of few hundred meters. Network looks pretty good with all the above problems.
no wires and increases flexibility too. WLAN also have
capability to wired local area networks (LAN) or other
II. BACKGROUND & RELATED WORK
WLAN workstations. These all factors helped for booming of
this technology. WLANs have been criticized a lot
A WIPS with an intelligent plan recognition and preconcerning their ability to provide security equivalent to decision engine that makes use of honeypots to detect and
wired LANs. Moreover, security in wireless networks was prevent potential intrusions have been put forth by author but
considered to be sparse ever since its introduction. Wired it failed to recognize unknown wireless attacks [1]. The
Equivalent Privacy (WEP), the first security protocol which system that used Detector to monitor wireless data timely,
was created by IEEE proved to be inadequate [6, 7]. However, Intrusion detection system IDS which is used to collect the
it has been proved form time to time that WEP has failed to data came from detector and determine the rogue device,
meet security goals like data confidentiality, access control Network management software, which is used to
and data integrity up to the expected level [6, 7]. New class of communicate with the wired network, determine the switch
Abstract— - The incredible rise in the deployment of WLANs is
observed in commercial, military and various other domains in
past few years. But still there are many loopholes found in
present era of wireless network security of which adversaries
can easily take advantage. However unauthorized hosts that
may be either intruders or Rouge Access Points still continue to
be a major threat to this security. The common practice of
intrusion is observed with intent of accessing free internet while
the Rouge Access Points may exist with intent of spoofing the
data from somebody’s private Network. The adversaries take
advantage of common vulnerabilities which are found in almost
every network. Taking into account the existing network
security standards, we propose our paper which contains an
approach to detect such type of intrusions and eliminate them.
The main premise of our approach is to distinguish between
authorized users & adversaries by making use of Intelligent
Mobile Agents (MA) and other traditional parameters like IP &
MAC Address and then eliminate these adversaries. We take
into account various Qos parameters like network payload, time
complexity and latency in order to make sure that performance
of network is not compromised to a large extent.
port which meets the rogue device and disconnect the port
was proposed by author[4]. A novel lightweight user-side evil
twin attack detection technique using TMM (Trained Mean
Matching) and HDT (Hop Differentiating Technique)
algorithms has been proposed [2]. A system that detects the
illegal behaviour of corrupted machines based on policies
indicating allowed communications was presented, but this
system relied on third party to check violation of policies and
to notify network admin [3]. Research has indicated that even
an 128-bit WEP key of a wireless transmission can be quickly
decrypted via BackTrack or Aircrack-ng tool [1]. Attacker
can even potentially decrypt the WPA/WPA2 key using
Cowpatty tool [1].
III. PROPOSED SYSTEM
To deal with different kind of unauthorized hosts we make
use of intelligent Mobile Agent (MA). Mobile agents [8]
perform a task by migrating and executing on several
computers connected to the network.
A. Initial Setup of Network
In this Mobile Agent System (MAS) is deployed on every
computer in the Network. We make use of two MA’s
programs which communicate with each other. The first
program is deployed on the centralized Host(s) (Host that is
supposed to detect unauthorized host(s)) and Second program
is deployed on other trusted computer’s in the Network.MA
on each Host in the Network is given a set of Agent ID‘s
(AID’s) which are in the encrypted form. These AID’s are
mapped to MAC, SSID and IP of that particular computer.
The information (MAC, SSID, IP and AID’s (In decrypted
form)) about each computer in the Network is stored in the
database file at the centralized System(s).Every time
whenever we need a new computer system to be brought in
the Network it should be authorized first by installing MAS,
deploying second MA program on it and then updating the
information of corresponding computer in the database at
centralized system.
B. Basic Detection and prevention Methodology
Refer Fig.1 a MA from the centralized system 2 will
randomly select one of the Active computers from those
which are connected to Access Point (A) and visit there.
While a MA from the centralized system 1 will randomly
select one of the Active computers from the Network and
visit there. If the selected computer contains MAS then MA
gets executed on that system and returns back to centralized
system. Selected computer gets Authenticated if the
information supplied by it matches with the corresponding
information that is present in the database at the centralized
system. If the selected computer doesn’t contain MAS then
that computer is considered as unauthorized and is not
allowed to get authenticated. It is responsibility of the
Centralized system 2 to prevent any type of unauthorized host
to get connected to Access Point (A).Similarly it is
responsibility of the Centralized system 1 to prevent any type
of unauthorized host to get connected to Network. In general
it is responsibility of Centralized system to prevent any type
of intrusion in the Network to which it (Centralized system)
is directly connected.
Fig. 1 Working of our proposed system in real world scenario
C. Detection and prevention Methodology in Different Cases
Case 1: Suppose intruder tries to connect his laptop
directly to Access Point A .There is no MAS installed on his
laptop.
Prevention Technique: The MA from centralized System 2
will migrate to intruder’s laptop. As there is no MAS on this
laptop then MA won’t be able to execute itself. This will be
noticed at the centralized system 2 an intruders laptop is not
allowed to get authenticated.
Case 2: In fig. above Access Point (B) is brought up in the
Network by an intruder. Next he connects his laptop to this
Access Point (i.e. Access Point B) and assigns MAC, SSID
and IP of one of the trusted computers in the Network to
accomplish his desires. Assume that there is no MAS on his
laptop.
Prevention Technique:







MA form Centralized system 1 will randomly select
one of the active computers in the Network and visit
there.
Suppose MA from Centralized system 1 select
Trusted Host (A) it will visit there. This MA will get
all the information from the MA program present on
this host that is needed for Authentication purpose
and get back to Centralized System 1 and as this
information is correct then this Host is authenticated.
The above step will be repeated for each trusted
Host.
When the MA will reach the intruders laptop then it
won’t be able to execute itself on that laptop. Hence
the intrusion is confirmed and the Access point at
which this intrusion takes place is considered as
Rouge Access Point.
Once the Rouge Access Point is confirmed it can be
eliminated by making use of switch.
A SNMP command is given to switch to block the
port to which RAP is connected.
In this way a RAP can be eliminated.
Case 3: Let’s make minor changes in above case and
assume that now the intruder installs the MAS system on his
laptop and again connects it to Access Point B. Assume that
he also deploys the MA program which will provide
information to MA of centralized system 1.
IV. ADVANTAGES OF USING MA BASED APPROACH
Most of the existing strategies make use of underlying
Network protocols to detect any un-trusted host (conventional
intruder or RAP).This in turn increase Network traffic and
hence decrease the performance of the Network. To tackle
with the above drawbacks and increase the level of security
we make use of Mobile Agents. Mobile Agents can take
advantage of natural parallelism of large Networks to offer
performance improvements over usual centralized security
monitoring by distributing the workload over the
Network.MA can be used in any type of Network i.e. either
wired or wireless or both (wired and wireless). Moreover it is
difficult for intruder to disturb working of Mobile Agent
Based System. The feature of fault-tolerance also gets added
with the introduction of MA, it means that now Network is
not susceptible to single point failure.
V. CONCLUSIONS
In the beginning of this paper we first do the analysis of
the threats to wireless LANs, then give an overview of
existing intrusion prevention system and RAP detection
systems in WLANs. To detect and response these wireless
attacks, we design an intelligent MA based WIPS. This
System is believed to be more reliable and efficient then most
of the existing systems.
REFERENCES
[1]
[2]
[3]
[4]
Prevention Technique:
[5]





MA form Centralized system 1 will randomly select
one of the active computers in the Network and visit
there.
Suppose MA from Centralized system 1 select
intruder’s laptop it will visit there. This MA will get
all the information from the MA program present on
this host that is needed for Authentication purpose
and get back to Centralized System 1 and as this
information is incorrect then this computer is
considered as unauthorized and Access Point to
which it is connected is considered as Rouge.
Once the Rouge Access Point is confirmed it can be
eliminated by making use of switch.
A SNMP command is given to switch to block the
port to which RAP is connected.
In this way a RAP can be eliminated.
[6]
[7]
[8]
[9]
Zebing Wang., Research of Wireless Intrusion Prevention Systems
based on Plan Recognition and Honeypot, IEEE, 2009.
Chao Yang, “Active User-Side Evil Twin Access Point Detection
Using Statistical Techniques,” IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 5,
OCTOBER 2012.
Kenichi Takahashi “Intrusion Detection using Third-Parties Support,”
in 12th IEEE International Workshop on Future Trends of Distributed
Computing Systems,2008.
R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “The Intrusion
Detection System design in WLAN based on rogue AP” IEEE
Computer Engineering and Technology (ICCET), 2010 2nd
International Conference,VOL. 7,APRIL 2010
Khalil El-Khatib, “Impact of Feature Reduction on the Efficiency of
Wireless Intrusion Detection Systems,” IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 8,
AUGUST 2010.
Ossmann.M.“WEP : Dead Again , Part1”
http://securityfocus.com/infocus/1814
Ossmann.M. “WEP: Dead Again, Part2”
http://securityfocus.com/infocus/1824
Lange, Danny B. Chang, Daniel T. “IBM Aglets Workbench White
Paper” http://www.trl.ibm.co.jp/aglets/whitepaper.html
Arun Koshal ,“Mitigating Wireless Security Attacks”,White
Paper ,Tech Mahindra IT Services & Telecom Solutions.
Download