Secured network sensor-based defense system

Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

[1]  Xinwen Fu,et al.  On effective localization attacks against Internet Threat monitors , 2013, 2013 IEEE International Conference on Communications (ICC).

[2]  Matthias Hemmje,et al.  A 3D Based User Interface for Information Retrieval Systems , 1993, Workshop on Database Issues for Data Visualization.

[3]  John J. Salerno,et al.  Measuring the worthiness of situation assessment , 2011, Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON).

[4]  Genshe Chen,et al.  Scheduling methods for unmanned aerial vehicle based delivery systems , 2014, 2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC).

[5]  Erik Blasch,et al.  A Markov game theoretic data fusion approach for cyber situational awareness , 2007, SPIE Defense + Commercial Sensing.

[6]  Jose B. Cruz,et al.  Game Theoretic Approach to Threat Prediction and Situation Awareness , 2006, 2006 9th International Conference on Information Fusion.

[7]  Genshe Chen,et al.  On detection and visualization techniques for cyber security situation awareness , 2013, Defense, Security, and Sensing.

[8]  Jeffrey J. P. Tsai,et al.  Modeling a secure sensor network system using an Extended Elementary Object System , 2008, 2008 7th IEEE International Conference on Cognitive Informatics.

[9]  Luca Fanucci,et al.  Smart transducer interface in embedded systems for networked sensors based on the emerging IEEE 1451 Standard: H2 Detection Case Study , 2009, 2009 Seventh Workshop on Intelligent solutions in Embedded Systems.

[10]  Wei Yu,et al.  A distributed network-sensor based intrusion detection framework in enterprise networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[11]  Riccardo Bettati,et al.  Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures , 2010, IEEE Transactions on Computers.

[12]  Erik Blasch,et al.  Simulation study of unmanned aerial vehicle communication networks addressing bandwidth disruptions , 2014, Defense + Security Symposium.

[13]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[14]  Daniel T. Fokum,et al.  Securing wireless sensor networks from denial-of-service attacks using artificial intelligence and the CLIPS expert system tool , 2013, 2013 Proceedings of IEEE Southeastcon.

[15]  Xun Wang,et al.  An Invisible Localization Attack to Internet Threat Monitors , 2009, IEEE Transactions on Parallel and Distributed Systems.

[16]  Wei Yu,et al.  A threat monitoring system for smart mobiles in enterprise networks , 2013, RACS.

[17]  Genshe Chen,et al.  On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback , 2013, SNPD.

[18]  Hans Hengartner,et al.  Antigen localisation regulates immune responses in a dose‐ and time‐dependent fashion: a geographical view of immune reactivity , 1997, Immunological reviews.

[19]  Koichi Hashimoto,et al.  Fast and optimal sensor scheduling for networked sensor systems , 2008, 2008 47th IEEE Conference on Decision and Control.

[20]  Yang Xin,et al.  A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[21]  Xinwen Fu,et al.  On simulation studies of cyber attacks against LTE networks , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[22]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[23]  Eloi Bosse,et al.  High-Level Information Fusion Management and System Design , 2012 .

[24]  Qian Du,et al.  Optical Flow and Principal Component Analysis-Based Motion Detection in Outdoor Videos , 2010, EURASIP J. Adv. Signal Process..

[25]  Erik Blasch,et al.  Review of game theory applications for situation awareness , 2015, Defense + Security Symposium.