Top Banner
Intrusion Detection in Wireless Sensor Networks [email protected]
11

IDS in WSN - Intro

Jun 14, 2015

Download

Education

christophevg

The first in a series of short presentation to introduce my master's thesis on Intrusion Detection in Wireless Sensor Networks.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IDS in WSN - Intro

Intrusion Detection in Wireless Sensor Networks

[email protected]

Page 2: IDS in WSN - Intro

Classic Network IDS

activate tcp any any -> 192.168.1.21 22 \! (content:"/bin/sh"; activates:1; \ ! msg:"Possible SSH buffer overflow"; )!dynamic tcp any any -> 192.168.1.21 22 \! (activated_by:1; count:100;)

Page 3: IDS in WSN - Intro

Wireless Sensor Network IDS

Page 4: IDS in WSN - Intro

software attestation

reputationoutliers

machine learning

cooperative

anomalies

patterns

Page 5: IDS in WSN - Intro

reputation

Page 6: IDS in WSN - Intro

reputation anomaly

routing table updates

collision rate

RTS arrival rate

average waiting time

Page 7: IDS in WSN - Intro

reputation anomaly pattern

Page 8: IDS in WSN - Intro

reputation anomaly pattern

actual application

Page 9: IDS in WSN - Intro

reputation anomaly pattern

Step1: Extract a framework with an API

Page 10: IDS in WSN - Intro

reputation anomaly pattern

Step2: Reduce algorithmic “inefficiencies”.

loopsvariables reuse of memory

no type-checking repetitive

checking

Page 11: IDS in WSN - Intro

Goal 1:!Investigate possibility to define such a framework.

Goal 2:!Implement it and quantify gain or minimal cost.