talk-rockwell-May2004 - Intrusion Detection for Mobile Ad...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
TC/Rockwell/5-20-04 SMU Engineering p. 1 Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen Intrusion Detection for Mobile Ad Hoc Networks
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TC/Rockwell/5-20-04 SMU Engineering p. 2 Security problems in MANETs Role of intrusion detection systems (IDSs) General IDS techniques Challenges for IDS in MANETs Some research problems Outline
Background image of page 2
TC/Rockwell/5-20-04 SMU Engineering p. 3 Wireless Security Security for wireless networks is much harder than wired networks - Radio links are vulnerable to attacks from a distance, whereas wired links require physical access - Passive attacks (eavesdropping) are easy - Active attacks (masquerading, packet modification/interception, denial of service,…) are easy
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TC/Rockwell/5-20-04 SMU Engineering p. 4 Security in MANETs Ad hoc networks present additional security problems - Mobile nodes are more vulnerable to capture or compromise - Proper routing operation of MANET depends on cooperation of all nodes -- compromised nodes may disrupt entire network - No fixed infrastructure to support security, eg, authentication server -- nodes must handle security by themselves
Background image of page 4
TC/Rockwell/5-20-04 SMU Engineering p. 5 Role of Intrusion Detection Security is based on cryptography which helps to - Keep data confidential - Authenticate the identity of hosts - Validate data integrity But cryptography is not sufficient protection - will not prevent attacks or prevent hosts from capture
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TC/Rockwell/5-20-04 SMU Engineering p. 6 Intrusion Detection (cont) IDSs are part of typical “defense in depth” strategies - Various security components form layers of protection against attacks - Goal is not perfect protection, but make attackers spend more effort (cost)
Background image of page 6
TC/Rockwell/5-20-04 SMU Engineering p. 7 Defense in Depth Perimeter defense: firewalls, VPNs Monitor exterior: intrusion detection Core access: access control
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TC/Rockwell/5-20-04 SMU Engineering p. 8 Role of Intrusion Detection By analogy, castle is protected by walls, locked doors, moat, vault -- preventive layers IDSs serve as burglar alarms -- reactive layer - Useful complement to preventive layers
Background image of page 8
SMU Engineering p. 9 Intrusion Detection (cont) 1980 James Anderson wrote report for US Air Force proposed a method for filtering computer audit trails and detecting unusual usage patterns through statistical analysis
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 33

talk-rockwell-May2004 - Intrusion Detection for Mobile Ad...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online