Best-effort Data Leakage Prevention in inter-organizational tactical MANETs

Reconfigurable Radio Systems (RRS), based on Software Defined Radio (SDR) and Mobile Ad-hoc Network (MANET) technologies, offer considerable advantages for military operations, such as increased network survivability and interoperability. The RRS-based Common Tactical Radio System (GTRS), currently in development by the Swedish Armed Forces, is designed for use in diverse geographical settings and for purposes varying from international combat missions to national contingency operations. However, protecting these networks from attacks and safeguarding the carried information against leaks is an ongoing research challenge, especially in combined scenarios where tactical data may flow across organizational boundaries. This paper presents a best-effort approach to Data Leakage Prevention (DLP) for inter-organizational RRS-based networks. The proposed architecture makes use of data mining techniques and an efficient n-dimensional clustering algorithm which has previously been successfully used for real-time anomaly detection in critical infrastructure protection. The DLP architecture is developed as an extension to the GTRS system, modeled and simulated in OPNET™ Modeler. Our results show that common data leaks can be efficiently identified by the proposed scheme, while keeping the important false positive rate at a very low level.

[1]  Simin Nadjm-Tehrani,et al.  Adaptive real-time anomaly detection with incremental clustering , 2007, Inf. Secur. Tech. Rep..

[2]  Johan Sigholm Reconfigurable Radio Systems : Towards Secure Collaboration for Peace Support and Public Safety , 2010, ECIW 2010.

[3]  Dong-You Choi,et al.  A Novel Cross Layer Intrusion Detection System in MANET , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[4]  Robert Koch Towards next-generation Intrusion Detection , 2011, 2011 3rd International Conference on Cyber Conflict.

[5]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[6]  Robert E. Donnelly,et al.  Impact of the Network Environment on a Common Operating Environment , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[7]  Stephen D. Wolthusen,et al.  Efficient Trust Authority Distribution in Tactical MANET Environments , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[8]  Victor Pomponiu,et al.  Securing Wireless Ad Hoc Networks: State of the Art and Challenges , 2014 .

[9]  Simin Nadjm-Tehrani,et al.  Anomaly Detection in Water Management Systems , 2012, Critical Infrastructure Protection.

[10]  Christos Xenakis,et al.  A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..

[11]  Damien Lavaux,et al.  Public Safety Situation Aware Services over Cognitive Radio Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[12]  Simin Nadjm-Tehrani,et al.  Hastily Formed Networks for Disaster Response: Technical Heterogeneity and Virtual Pockets of Local Order , 2009 .

[13]  Javier Lopez,et al.  Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense , 2012 .

[14]  Marko Jahnke,et al.  MITE – MANET Intrusion Detection for Tactical Environments , 2008 .

[15]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[16]  Simin Nadjm-Tehrani,et al.  ADWICE - Anomaly Detection with Real-Time Incremental Clustering , 2004, ICISC.

[17]  Lars Löfgren,et al.  Military Technology for Resource-Limited Time-Sensitive Targeting , 2010 .

[18]  Tian Zhang,et al.  BIRCH: an efficient data clustering method for very large databases , 1996, SIGMOD '96.

[19]  Fredrik Maxen A Comparative Analysis of Network Approaches for Tactical Wireless Communications, Validated by Joint Communication Simulation System (JCSS) Simulations: A Swedish Perspective , 2011 .