Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks

In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques for protecting the related information that must be exchanged between nodes. In particular, we exploit information visualization and machine learning techniques in order to achieve efficient and effective intrusion detection. In order to avoid possible modification or alteration of the maps produced by the intrusion detection engine, we focus on safeguarding and authenticating them using a novel embedded watermarking method. Previously, we had shown promising results in the intrusion detection task using this system. This paper focuses on the watermarking technique and gives a detailed exposition that includes an experimental evaluation of its quality.

[1]  Yang Li,et al.  MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[2]  Aikaterini Mitrokotsa,et al.  Intrusion Detection with Neural Networks and Watermarking Techniques for MANET , 2007, IEEE International Conference on Pervasive Services.

[3]  F. Mörchen,et al.  ESOM-Maps : tools for clustering , visualization , and classification with Emergent SOM , 2005 .

[4]  Aikaterini Mitrokotsa,et al.  Intrusion Detection and Response in Ad hoc Networks , 2007 .

[5]  Ayman I. Kayssi,et al.  LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System , 2008, Int. J. Netw. Secur..

[6]  Dharma P. Agrawal,et al.  SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[7]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[8]  Jung-Min Park,et al.  A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..

[9]  Chwei-Shyong Tsai,et al.  An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet , 2005, Int. J. Netw. Secur..

[10]  Olivier Festor,et al.  Group Key Management in MANETs , 2008, Int. J. Netw. Secur..

[11]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[12]  Luc Girardin An Eye on Network Intruder-Administrator Shootouts , 1999, Workshop on Intrusion Detection and Network Monitoring.

[13]  Juergen Seitz,et al.  Digital Watermarking for Digital Media , 2005 .

[14]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[15]  Jiwu Huang,et al.  Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions , 2006, Int. J. Netw. Secur..

[16]  Chun-Ta Li,et al.  Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks , 2009, Int. J. Netw. Secur..

[17]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[18]  Douglas S. Reeves,et al.  Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework , 2001, SEC.

[19]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.

[20]  Tarun Bhaskar,et al.  A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability , 2008, Int. J. Netw. Secur..

[21]  Teddy Furon,et al.  A Survey of Watermarking Security , 2005, IWDW.

[22]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[23]  C. Satizabal,et al.  Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).

[24]  Aikaterini Mitrokotsa,et al.  Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks , 2008, ArXiv.

[25]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[26]  S. Hyakin,et al.  Neural Networks: A Comprehensive Foundation , 1994 .

[27]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[28]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[29]  Anil Rawat,et al.  Enhanced DSR for MANET with Improved Secured Route Discovery and QoS , 2007, Int. J. Netw. Secur..

[30]  S. A. M. Makki,et al.  The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV) , 2004, Security and Management.

[31]  Ming-Chin Chuang,et al.  An Efficient Authentication Scheme between MANET and WLAN Based on Mobile IPv6 , 2005 .