insider attacker detection

52
Insider Attacker Detection Presented by Fang Liu [email protected]

Upload: irving

Post on 24-Feb-2016

65 views

Category:

Documents


0 download

DESCRIPTION

Insider Attacker Detection. Presented by Fang Liu [email protected]. Outline. Introduction Detection of Faulty Sensors Detection of Routing Misbehaviors A General Solution – Insider Attacker Detection in Wireless Sensor Networks. Secure the Sensor Networks. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Insider Attacker Detection

Insider Attacker Detection

Presented by Fang Liu

[email protected]

Page 2: Insider Attacker Detection

04/22/23 2

Outline Introduction Detection of Faulty Sensors Detection of Routing Misbehaviors A General Solution

– Insider Attacker Detection in Wireless Sensor Networks

Page 3: Insider Attacker Detection

04/22/23 3

Secure the Sensor Networks Protecting confidentiality, integrity, and availability of the

communications and computations Sensor networks are vulnerable to security attacks due to

the broadcast nature of transmission Jamming, eavesdropping, etc.

Sensor nodes can be physically captured or destroyed All information will be released if not tamper-resistant.

Page 4: Insider Attacker Detection

04/22/23 4

Compromised Sensors Sensors are vulnerable.

Subject to physical attacks Not tamper-resistant

Compromised nodes can launch insider attacks. False information

False readings, Data alteration, etc Routing misbehaviors

Message negligence, selective forwarding, jamming, etc.

Page 5: Insider Attacker Detection

04/22/23 5

Challenges in Detecting Insider Attackers Compromised nodes know all the information!

Cannot be detected with classical cryptographic security mechanisms Authentication, Integrity protection, etc

Difficult to study the normal/abnormal node activities Dynamic attacks

No centralized server to perform analysis and correlation

Page 6: Insider Attacker Detection

04/22/23 6

Existent Solutions

Detection of False Information Detection of Routing Misbehaviors Our Work –

A General Solution to Insider Attacker Detection in Wireless Sensor Networks

Page 7: Insider Attacker Detection

04/22/23 7

Detection of False Information Detecting and tolerating false information inserted by

Faulty sensors Compromised sensors

Methods: Centralized solution: The base station collects the data and

checks the correctness [Shen ICC’01, Koushanfar et al. Sensors’03]

Secure data aggregation [Cao et al Mobihoc’06] Fault-tolerant event detection: Disambiguate events from noise-

related error, faulty sensors 0/1 predicate Comparison with neighborhood activities [Cheng et al. Infocom’05]

Page 8: Insider Attacker Detection

04/22/23 8

Detection of Routing Misbehaviors Routing misbehaviors:

Selective forwarding, packet dropping, etc.

One contemporary solution: Forward packets only through nodes that share a priori

trust relationship. But, It requires key distribution. Trusted nodes may be still overloaded, broken or

compromised Untrusted nodes may be well behaved.

Page 9: Insider Attacker Detection

04/22/23 9

Detection of Routing Misbehaviors

Method: Detect with the help of base station

“Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks”

Detect by monitoring the neighborhood “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”

Page 10: Insider Attacker Detection

04/22/23 10

Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks Misbehavior model

Dropping of queries and data packets

Assume the availability of location information and the ability to perform geographic routing

Main procedure Base stations send marked packets to probe sensors, and

rely on the responses to identify and isolate insecure location Sensors route packets to trusted neighbors

Page 11: Insider Attacker Detection

04/22/23 11

TRANS Components

Authentication

Periodic beaconing

Page 12: Insider Attacker Detection

04/22/23 12

Trust Routing Protocol Send packets only toward trusted neighbors Trust table based security mechanism

Page 13: Insider Attacker Detection

04/22/23 13

TRANS Scenario

Page 14: Insider Attacker Detection

04/22/23 14

TRANS Scenario

Page 15: Insider Attacker Detection

04/22/23 15

Isolating Insecure Location(1/2) Finding Malicious Node

(Probing) E-TTL

Send probe packet with increasing hop-count

Binary Send probe packet in a

binary search fashion One-Shot

Send probe packet along the path and each node replies its location

Page 16: Insider Attacker Detection

04/22/23 16

Isolating Insecure Location(2/2) Isolating Method

Sink finds misbehaving node and generate Black List

Black List Geocast Broadcast black list Remove isolated node from neighbor list Broadcasting overhead

Embedded Black List Embedded black list in packet header Detour point using geographic routing

Page 17: Insider Attacker Detection

04/22/23 17

Summary: Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks

Routing misbehaviors detection and isolation Centralized detection Isolating Misbehavior node using black list

Trust routing protocol design Trust evaluation may be not working for insider

attackers Based on authentication

Page 18: Insider Attacker Detection

04/22/23 18

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

Ad hoc networks maximize total network throughput by using all available nodes for routing and forwarding.

A node may misbehave by agreeing to forward the packet and then failing to do so because it is Overloaded, Selfish, Malicious or Broken

Few misbehaving nodes can have a severe impact

Page 19: Insider Attacker Detection

04/22/23 19

Proposed Solutions Install extra facilities in the network to detect and

mitigate routing misbehavior. Make only minimal changes to the underlying

routing algorithm.

Two extensions to DSR - “Watchdog” and “Pathrater” Watchdog identifies misbehaving nodes by overhearing

transmissions Pathrater avoids routing packets through these nodes

Page 20: Insider Attacker Detection

04/22/23 20

Assumptions

Some assumptions are Links between the nodes are bi-directional Nodes are in promiscuous mode operation Malicious node does not work in groups

AB

C

Page 21: Insider Attacker Detection

04/22/23 21

Watchdog The watchdog is implemented by maintaining a buffer of recently Each overheard packet is matched with the packet in the buffer In case of a match, the packet in the buffer in removed By overhearing, tampering of payload or header can also be

detected If the packet, however, has remained in the buffer for longer than a

certain timeout The watchdog increases the failure tally for the node responsible for

forwarding on the packet If the tally exceeds the threshold value, it determines that the node is

misbehaving

Page 22: Insider Attacker Detection

04/22/23 22

Watchdog (Contd) Advantages

It can detect misbehavior at the forwarding level

Disadvantages are Might not detect packet drops due to collisions

Ambiguous collisions Receiver collisions Limited transmission power Others

Page 23: Insider Attacker Detection

04/22/23 23

Ambiguous Collisions

BA

SPacket # 1

Packet # 1

C

D

IH

F

G

Packet # 1

The ambiguous problem prevents node A from overhearing transmission from B

A cannot overhead B

Page 24: Insider Attacker Detection

04/22/23 24

Limited transmission Power

BA

SPacket # 1

Packet # 1

D

EH

F

G

Packet # 1

Misbehaving node can control its transmission power to circumvent the watchdog

A cannot overhead B

Page 25: Insider Attacker Detection

04/22/23 25

False Misbehavior

BA

SPacket # 1

Packet # 1

D

FH

C

GFailure Tally ++;If (Failure Tally > Threshold) notify source;

A reports that B is not forwarding packets when in fact it is.

When nodes falsely report other nodes as misbehaving

Page 26: Insider Attacker Detection

04/22/23 26

Collusion

BA

SPacket # 1

Packet # 1

D

FH

C

G

A forwards to B, but doesn’t report when B drops the packet.

Multiple nodes in collusion can mount a more sophisticated attack

Page 27: Insider Attacker Detection

04/22/23 27

Partial Dropping

BAS

Packet # 1Packet # 1

D

FH

CG

Packet # 2

Failure Tally ++;If (Failure Tally > Threshold) notify source;

B drops packets at a lower rate than the misbehavior detection threshold.

A node can circumvent the watchdog by dropping packets at a lower rate than the watchdog’s configured minimum misbehavior threshold

Page 28: Insider Attacker Detection

04/22/23 28

Pathrater Each nodes maintain a rating for every other node

it knows about in the network A path metric is the Average of the Node ratings

along the path. The metric gives a comparison of the overall

reliability of different paths If there are multiple paths to the same destination,

the path with the highest metric is chosen

Page 29: Insider Attacker Detection

04/22/23 29

Summary: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

Enable nodes to avoid malicious nodes (overloaded, malicious, selfish, broken) in their routes Watchdog – identifies misbehavior nodes by listening to the next

node’s transmission Pathrater – helps routing protocols avoid these nodes

Allows nodes to use better paths and thus to increase their throughput

The watchdog determines a malicious through threshold comparison. How the threshold value is calculated ? - it is one of the important

factor in detecting malicious nodes

Page 30: Insider Attacker Detection

04/22/23 30

A Framework for Identifying Compromised Nodes in Sensor Networks

Identifying compromised nodes? Use the alert information!

But, compromised nodes may … Raise false alerts Form a local majority and collude Behave arbitrarily

An application-independent framework to identify compromised node based on alert reasoning

Page 31: Insider Attacker Detection

04/22/23 31

Assumptions Application-specific detection mechanisms

Beacon probing, watchdog …

Static sensor networks Fixed observability relationship

Message confidentiality and integrity Secure comm. with base stations

Trustable base stations Centralized

Page 32: Insider Attacker Detection

04/22/23 32

An Example

The base station should: Have the monitoring relationship Consider the possibility of false alerts Probe beacon nodes regularly

The sensor network The observability graphBeacon

Sensor

Page 33: Insider Attacker Detection

04/22/23 33

The Framework Sensor behavior model:

Reliability rm: the percentage of normal activities conducted by an

uncompromised node.

Observer model: Observability rate rb: s1 may not observe each activity of s2

Positive accuracy rp: s1 may not detect the abnormal activity of s2

Negative accuracy rn: s1 raise alert against s2, but s2 is normal.

Security estimation K The max # of compromised nodes that the network can work

Page 34: Insider Attacker Detection

04/22/23 34

Identification of compromised nodes Step 1: Label abnormal/normal alerts

Observe the alert pattern Get the expected #Alerts raised by s1 against s2

Compare with the actual #Alerts > expected#: abnormal; o.w. normal

Observability rate

Positive accuracyNegative accuracyReliability

fj(x): the distribution fo #events that can be sensed by j

Pb(alert: i against j)

Rij(t): expected # of alerts raised by i against j, when i, j are uncompromised

Page 35: Insider Attacker Detection

04/22/23 35

Identification of compromised nodes Step 2: Derive suspicious node pairs

Labelled observability graph G’(V,Ea+En) Node si and sj are a suspicious pair if:

(si,sj) or (sj,si) is in Ea, or s’ exists

(si,s’) in Ea & (sj,s’) in En, or, (si,s’) in En & (sj,s’) in Ea.

normal

abnormal

At least one of the suspicious pair is compromised!

Page 36: Insider Attacker Detection

04/22/23 36

Identification of compromised nodes Step 3: Find the compromised nodes

Definition: valid assignment

To identify the common nodes in all possible assignments: CompromisedCore

The largest number of truly compromised nodes, no false alarms

Page 37: Insider Attacker Detection

04/22/23 37

Alert reasoning algorithm Lemma 3.1: Given an inferred graph I(V;E), let VI be

a minimum vertex cover of I. Then the number of compromised nodes is no less than |VI|.

Theorem 3.1 Given an inferred graph I and a security estimation K, for any node s in I, s in CompromisedCore(I;K) if and only if |Ns|+CI’s > K. NP-complete Min vertex cover

Page 38: Insider Attacker Detection

04/22/23 38

Alert reasoning algorithm Corollary 3.1: Given an inferred graph I and a

security estimation K, for any node s in I, if |Ns|+MI’s > K, then s in CompromisedCore(I;K). Maximal matching: MG ≤ CG ≤ 2MG

|Ns|+CI’s > |Ns|+MI’s > K Polynomial

Page 39: Insider Attacker Detection

04/22/23 39

Simulation General+mm:

The general AppCompromisedCore algorithm + maximum matching

EigenRep PeerTrust

Reputation-based trust functions for P2P Majority Voting

Page 40: Insider Attacker Detection

04/22/23 40

Impact of the concentration of compromised nodes

Page 41: Insider Attacker Detection

04/22/23 41

Summary: A Framework for Identifying Compromised Nodes in Sensor Networks

Detection algorithm with maximum accuracy without false alarms

Effective with local majority

However, A priori knowledge about:

sensor behavior model observer model: the accuracy of the alert

Observability rate, positive accuracy, negative accuracy, etc. Centralized: the base station does the detection!

Page 42: Insider Attacker Detection

04/22/23 42

The Common Methodology

Suspicious Behavior Detection

Information Collection

Diagnosis and notification of the detection result

Watchdog-based,0/1 predicate

Reputation evaluation, threshold comparison, etc.

Requires application-specific knowledge!

Localized/centralized

Page 43: Insider Attacker Detection

04/22/23 43

Our Work – A General Solution to Insider Attacker Detection Insider attackers

Compromised nodes under the control of the adversary Data alteration, Message negligence, Selective forwarding,

etc

Challenges: The insider attacker knows all the secret information! The detection scheme must be efficient, flexible, and

localized

Cannot use cryptography-based techniques Localized statistical analysis?

Page 44: Insider Attacker Detection

04/22/23 44

The Basic Idea Observation: Similar networking behaviors in close

neighborhood.

Detection of insider attackers with a light, flexible and localized algorithm? Measure the networking behaviors of neighboring

nodes E.g. packet dropping rate, packet sending rate, forwarding

delay time, etc. Detect if any abnormal activities exist Exploiting the spatial correlation among neighboring sensors!

Page 45: Insider Attacker Detection

04/22/23 45

The Basic Algorithm Information Collection

Node x gets f (xi) for each neighbor xi in N(x)

Outlier Detection Assume f (xi) ~ Nq(μ,Σ), then the Mahalanobis squared

distance d2(xi) = (f (xi) -μ)TΣ-1(f (xi) -μ) ~ χ2q. Thus,

Prob(d2(xi)> χ2q(α)) = α.

xi could be an outlier if d2(xi) is sufficiently large.

Majority Vote

Page 46: Insider Attacker Detection

04/22/23 46

Two Extensions Estimate (µ,Σ) from the data set {f(xi)} with the

existence of outliers? If f(xi) ~ Nq(μ,Σ), d2(xi) = (f(xi) -μ)TΣ-1(f(xi) -μ) ~ χ2

q

(µ,Σ) is about the population of normal sensors Cannot use sample mean, sample covariance-

covariance to estimate (µ,Σ)

Robust statistics: Orthogonalized Gnanadesikan-Ketterring (OGK)

Page 47: Insider Attacker Detection

04/22/23 47

Two Extensions For a sparse network, information is collected from

multi-hop neighborhood, which may be inserted with false data.

Trust-based false information filtering

AB

C D

FE

B: (21,42,39)

B: (18,31,37)

B: (20,30,39)

Page 48: Insider Attacker Detection

04/22/23 48

Trust-based false information filtering

AB

C D

FE

C: (19,32,40)D: (22,11,42)E: (21,29,38)F: (19,31,39)

C: (0.83,0.63,0.15)D: (1.17,1.49,1.31)E: (0.50,0.33,1.02)F: (0.83,0.53,0.44)

C: 0.83D: 1.49E: 1.02F: 0.83

C: 1D: 0.56E: 0.81F: 1

max min/xstandardize

Sensor (A) should select a reliable relay node (D or F?) based on its own observation.

A’s monitoring results Trust value

standardize(y-μ)/σ

Page 49: Insider Attacker Detection

04/22/23 49

Performance Evaluation (1/3)

Evaluation metrics Detection accuracy:

False alarm:

Simulation settings Sparse or Dense networks Compromised relay nodes:

D: Identified outliersO: Real outliers

Page 50: Insider Attacker Detection

04/22/23 50

Performance Evaluation (2/3) Dense networks

Page 51: Insider Attacker Detection

04/22/23 51

Performance Evaluation (3/3) Sparse networks

Page 52: Insider Attacker Detection

04/22/23 52

Conclusion Achieves high detection accuracy, with low

false alarm rate Works well with 25% misbehaving sensors Requires no a priori knowledge about

network activities Relies on localized information exchange

only