Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min (Department of Computer Science and Engineering, Konkuk University, Key Laboratory of Industrial Internet of Things & Networked Control, Ministry of Education Chongqing University of Posts and Telecommunications) ;
  • Kim, Kee-Cheon (Department of Computer Science and Engineering, Konkuk University)
  • 투고 : 2011.03.22
  • 심사 : 2012.04.09
  • 발행 : 2012.06.30

초록

Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.

키워드

과제정보

연구 과제 주관 기관 : National Research Foundation of Korea (NRF)

참고문헌

  1. A. Willig, K. Matheus, and A. Wolisz, "Wireless technology in industrial networks," Proc. IEEE, vol. 93, pp. 1130-1151, June 2005. https://doi.org/10.1109/JPROC.2005.849717
  2. M. Wei, P. Wang, and Q. Wang, "Research and implementation of the security strategy for the wireless industry control network," Chinese J. Sci. Instrument, vol. 30, pp. 679-681, Apr. 2009.
  3. A. Willig, "Recent and emerging topics in wireless industrial communications: A selection," IEEE Trans Ind. Informat., vol. 4, pp. 102-124, May 2008. https://doi.org/10.1109/TII.2008.923194
  4. IEC 6 601 Ed1, "Industrial communication networks-fieldbus specification-WIA-PA communication network and communication profile," Oct. 2011.
  5. I. Demirkol, F. Alagoz, H. Delic, and C. Ersoy, "Wireless sensor networks for intrusion detection: Packet traffic modeling," IEEE Commun. Lett., vol. 10, pp. 22-24, Jan. 2006. https://doi.org/10.1109/LCOMM.2006.1576557
  6. IEC/PAS 62734, "Industrial Communication Networks-Fieldbus specifications-Wireless Systems for Industrial Automation: Process Control and Related Applications (based on ISA 100.11a)," Sept. 2011.
  7. IEC 62591 Ed.1, "Industrial Communication Networks-Wireless Communication Network and Communication Profiles-$WirelessHART^{TM}$," Apr. 2010.
  8. IEEE 802.15.4, "Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Networks- Specific Requirements-Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs)," 2006.
  9. P. Wang and H. Wang, Heng Wang, and Min Xiang. The Technology of Wireless Communication for Measuring and Controlling, Beijing: Publishing House of Electronics Industry, Mar. 2008.
  10. M. Wei, X. Zhang, W. Ping, K. Kim, and Y. Kim, "Research and implementation of the security method based on WIA-PA standard," in Proc. ICECE, China, Nov. 2010. pp. 1580-1585.
  11. Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Proc. the 6th MobiCom, USA, Aug. 2000, pp. 275-283.
  12. J. Tian, Z. Zhang, and W. Zhao, "The design and research of intrusion detection system based on misuse and anomaly," J. Electron. Inf. Technol., vol. 28, pp. 2163-2166, Nov. 2006.
  13. L. Lijun and L. Zhuowei, "A anomaly-based intrusion detection system in mobile wireless networks," Comput. Eng. Appl., vol. 42, pp. 165-167, July 2006.
  14. T. Piya and J. Andrew, "Energy efficiency of intrusion detection systems in wireless sensor network," in Proc. IEEE/WIC/ACM Int. Conf. Web Intelligence and Intelligent Agent Technol., Dec. 2006, pp. 227-230.
  15. S. Bo, Intrusion Detection in Moblie Ad Hoc Networks, Doctoral thesis, Texas A&M University, May 2004.
  16. M. Guizani, A. Rayes, and B. Khan, Network Modeling and Simulation: A Practical Perspective, John Wiley & Sons, Ltd, Chichester, UK. Feb. 2010, pp. 260-261.
  17. X. Wang, Q. Liu, and G. B. Giannakis, "Analyzing and optimizing adaptive modulation-coding jointly with ARQ for QoS-guaranteed traffic," IEEE Trans. Veh. Technol., vol. 56, pp. 710-720, Mar. 2007. https://doi.org/10.1109/TVT.2007.891465
  18. T. Q. Yang, "A time series data mining based on ARMA and hopfield model for intrusion detection," in Proc. Neural Netw. and Brain, China, Oct. 2005, pp. 1045-1049.
  19. Q. Liu, S. Zhou, and G. B. Giannakis, "Queuing with adaptive modulation and coding over wireless links: Cross-layer analysis and design," IEEE Trans. Wireless Commun., vol. 4, pp. 1142-1153, May 2005. https://doi.org/10.1109/TWC.2005.847005
  20. A. Lisa, The wireless network environment sensor: A technology independent sensor of faults in mobile wireless network links, Doctoral thesis, Rensselaer Polytechnic Institute Troy, New York, USA. Dec. 2002, pp. 21-29.
  21. A. Deshpande, C. Guestrin, and S. Madden, "Model-driven data acquisition in sensor networks," in Proc. the 30th VLDB Conf., Canada, Sept. 2004.
  22. Q. Cao, T. Abdelzaher, T. He, and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection," in Proc. ISPN, USA, Apr. 2005, pp. 20-27.
  23. S. J. Zhang and L. X. Qi, Time Series Analysis Simple Tutorial, Beijing: Tsinghua University Press, 2003, pp. 132-135.
  24. D. Y. Uu, K. Yang, and J. Z. Chen, "Agents: Present status and trends," J. Software, vol. 11, pp. 315-321, Mar. 2000.
  25. Y. E. Sagduyu and A. Ephremides, "The problem of medium access control in wireless sensor networks," IEEE Wireless Commun., vol. 11, pp. 44-53, June 2004.
  26. H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Research in Security and Privacy, USA, May 2003, pp. 197-213.
  27. L. Zhou, J. Ni, and C. V. Ravishankar, "Supporting secure communication and data collection in mobile sensor networksm," in Proc. IEEE INFOCOM, Spain, Apr. 2006, pp. 1-12.