DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks

Wireless Mesh Networks (WMN) are particularly vulnerable to attacks, since they feature constraint nodes, multi-hop communication, and an open wireless communication channel. These features limit the feasibility of the deployment of contemporary Intrusion Detection Systems (IDS): centralized systems fail because there is no strict network boundary, and distributed and/or cooperative systems challenge the limited resources of the nodes. As a result, practical IDSs for WMNs are scarce, and existing systems are limited with respect to detection capabilities. In this paper we present the design, implementation, and evaluation of "DogoIDS": an open source, mobile, active-probing-based intrusion detection system. Exploiting mobility allows to mitigate the limitations of distributed, node-dependent systems. The active nature of the system achieves detection capabilities beyond that of a purely passive system. We show the accuracy and speed of our prototype in a testbed WMN---based on the IEEE 802.11s standard---under realistic attacks.

[1]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[2]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[3]  Rajendra V. Boppana,et al.  On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks , 2011, IEEE Transactions on Mobile Computing.

[4]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[5]  Francesco Mondada,et al.  Cy-mag3D: a simple and miniature climbing robot with advance mobility in ferromagnetic environment , 2011, Ind. Robot.

[6]  Farooq Anjum,et al.  LiPaD: lightweight packet drop detection for ad hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[7]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[8]  Bernhard Walke,et al.  IEEE 802.11s: The WLAN Mesh Standard , 2010, IEEE Wireless Communications.

[9]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[10]  Karl N. Levitt,et al.  DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET , 2006, RAID.

[11]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[12]  Ioannis G. Askoxylakis,et al.  Business opportunities and considerations on wireless mesh networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[13]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[14]  Riccardo Bettati,et al.  IEEE TRANSACTIONS ON SYSTEMS , MAN , AND CYBERNETICS — PART A : SYSTEMS AND HUMANS , 2001 .

[15]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[16]  Sheng Ma,et al.  Real-time problem determination in distributed systems using active probing , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[17]  Roland Siegwart,et al.  Highly compact robots for inspection of power plants , 2010, 2010 1st International Conference on Applied Robotics for the Power Industry.

[18]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[19]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[20]  Débora C. Muchaluat-Saade,et al.  IEEE 802.11s Multihop MAC: A Tutorial , 2011, IEEE Communications Surveys & Tutorials.

[21]  John A. Clark,et al.  A grammatical evolution approach to intrusion detection on mobile ad hoc networks , 2009, WiSec '09.

[22]  David Hutchison,et al.  OpenLIDS: a lightweight intrusion detection system for wireless mesh networks , 2009, MobiCom '09.

[23]  Simon Pietro Romano,et al.  A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.