28 research outputs found

    Vers une solution de contrĂŽle d’admission sĂ©curisĂ©e dans les rĂ©seaux mesh sans fil

    No full text
    Wireless mesh networks (WMNs) are a very attractive new ïŹeld of research. They are low cost, easily deployed and high performance solution to last mile broadband Internet access. However, they have to deal with security and quality of service issues which prevent them from being largely deployed. In order to overcome these problems, we propose in this thesis two solutions: an admission control with links scheduling and a reputation system which detects bad nodes. These solutions have been devised in order to further merge into a secure admission control. Our admission control schedules dynamically the network’s links each time a new flow is accepted in the network. Its goal is to accept only flows which constraints in terms of delay and bandwidth can be respected, increase the network capacity and decrease the packet loss. Our reputation system aims at assigning each node of the network a reputation which value reflects the real behavior of the node. To reach this goal this reputation system is made of a monitoring tool which can watch many types of attacks and consider the packet loss of the network. The evaluations of our solutions show that they both meet their objectives in terms of quality of service and securityLes rĂ©seaux mesh sans fil (Wireless Mesh Networks-WMNs) sont des rĂ©seaux facilement dĂ©ployables et Ă  faible coĂ»t qui peuvent Ă©tendre l’Internet dans des zones oĂč les autres rĂ©seaux peuvent difficilement accĂ©der. Cependant, plusieurs problĂšmes de qualitĂ© de service (QoS) et de sĂ©curitĂ© freinent le dĂ©ploiement Ă  grande Ă©chelle des WMNs. Dans cette thĂšse, nous proposons un modĂšle de contrĂŽle d’admission (CA) et un systĂšme de rĂ©putation afin d’amĂ©liorer les performances du rĂ©seau mesh et de le protĂ©ger des nƓuds malveillants. Notre systĂšme de CA vise Ă  assurer la QoS des flux admis dans le rĂ©seau en termes de bande passante et de dĂ©lai tout en maximisant l’utilisation de la capacitĂ© du canal. L’idĂ©e de notre solution est d’associer au contrĂŽle d’admission une planification de liens afin d’augmenter la bande passante disponible. Nous proposons Ă©galement un systĂšme de rĂ©putation ayant pour but de dĂ©tecter les nƓuds malveillants et de limiter les fausses alertes induites par la perte de paquets sur les liens du rĂ©seau. L’idĂ©e de notre solution est d’utiliser des tests statistiques comparant la perte de paquets sur les liens avec un modĂšle de perte prĂ©Ă©tabli. De plus, il comprend un systĂšme de surveillance composĂ© de plusieurs modules lui permettant dĂ©tecter un grand nombre d’attaques. Notre CA et notre systĂšme de rĂ©putation ont Ă©tĂ© validĂ©s, les rĂ©sultats montrent qu’ils atteignent tous deux leurs objectif

    Towards a secure admission control in a wireless mesh networks

    No full text
    Les rĂ©seaux mesh sans fil (Wireless Mesh Networks-WMNs) sont des rĂ©seaux facilement dĂ©ployables et Ă  faible coĂ»t qui peuvent Ă©tendre l’Internet dans des zones oĂč les autres rĂ©seaux peuvent difficilement accĂ©der. Cependant, plusieurs problĂšmes de qualitĂ© de service (QoS) et de sĂ©curitĂ© freinent le dĂ©ploiement Ă  grande Ă©chelle des WMNs. Dans cette thĂšse, nous proposons un modĂšle de contrĂŽle d’admission (CA) et un systĂšme de rĂ©putation afin d’amĂ©liorer les performances du rĂ©seau mesh et de le protĂ©ger des nƓuds malveillants. Notre systĂšme de CA vise Ă  assurer la QoS des flux admis dans le rĂ©seau en termes de bande passante et de dĂ©lai tout en maximisant l’utilisation de la capacitĂ© du canal. L’idĂ©e de notre solution est d’associer au contrĂŽle d’admission une planification de liens afin d’augmenter la bande passante disponible. Nous proposons Ă©galement un systĂšme de rĂ©putation ayant pour but de dĂ©tecter les nƓuds malveillants et de limiter les fausses alertes induites par la perte de paquets sur les liens du rĂ©seau. L’idĂ©e de notre solution est d’utiliser des tests statistiques comparant la perte de paquets sur les liens avec un modĂšle de perte prĂ©Ă©tabli. De plus, il comprend un systĂšme de surveillance composĂ© de plusieurs modules lui permettant dĂ©tecter un grand nombre d’attaques. Notre CA et notre systĂšme de rĂ©putation ont Ă©tĂ© validĂ©s, les rĂ©sultats montrent qu’ils atteignent tous deux leurs objectifsWireless mesh networks (WMNs) are a very attractive new ïŹeld of research. They are low cost, easily deployed and high performance solution to last mile broadband Internet access. However, they have to deal with security and quality of service issues which prevent them from being largely deployed. In order to overcome these problems, we propose in this thesis two solutions: an admission control with links scheduling and a reputation system which detects bad nodes. These solutions have been devised in order to further merge into a secure admission control. Our admission control schedules dynamically the network’s links each time a new flow is accepted in the network. Its goal is to accept only flows which constraints in terms of delay and bandwidth can be respected, increase the network capacity and decrease the packet loss. Our reputation system aims at assigning each node of the network a reputation which value reflects the real behavior of the node. To reach this goal this reputation system is made of a monitoring tool which can watch many types of attacks and consider the packet loss of the network. The evaluations of our solutions show that they both meet their objectives in terms of quality of service and securit

    Integrating short history for improving clustering based network traffic anomaly detection

    No full text
    International audienceTraffic anomaly detection is of premier importance for network administrators as anomalies have a dramatic impact on network performances, and QoS perceived by users. It is, however, a very time consuming and costly task that often requires decision from network and security experts. For making anomaly detection autonomous, many research works started investigating the use of unsupervised machine learning techniques, and in most cases traffic clustering. Identifying the clusters corresponding to anomalous traffic classes among the full set of detected clusters still remains a challenge. This is mostly due to the nature of clustering techniques that work on traffic samples of a given duration, each cluster being classified after an uncertain post processing stage. In this paper, we show how anomaly detectors can benefit from keeping a temporal track of the clustering results along time. This improvement has been added to ORUNADA (Online Real-time Unsupervised Network Anomaly detection Algorithm) that aimed at providing efficient anomaly detection on high speed networks. This new ORUNADA version-called H-ORUNADA for History-ORUNADA-is then evaluated on a new ground truth, called SynthONTS, that is currently designed to provide a modern and complete dataset with labeled anomaly. H-ORUNADA has also been implemented on Spark Streaming for being able to work on very high speed networks (targeting several hundreds of Gbits/s), and evaluated on the Google Cloud Platform

    A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network

    No full text
    International audienc

    Unsupervised Network Anomaly Detection in Real-Time on Big Data

    No full text
    International audienceNetwork anomaly detection relies on intrusion detection systems based on knowledge databases. However, building this knowledge may take time as it requires manual inspection of experts. Actual detection systems are unable to deal with 0-day attack or new user's behavior and in consequence they may fail in correctly detecting intrusions. Unsu-pervised network anomaly detectors overcome this issue as no previous knowledge is required. In counterpart, these systems may be very slow as they need to learn trac's pattern in order to acquire the necessary knowledge to detect anomalous ows. To improve speed, these systems are often only exposed to sampled trac, harmful trac may then avoid the detector examination. In this paper, we propose to take advantage of new distributed computing framework in order to speed up an Unsuper-vised Network Anomaly Detector Algorithm, UNADA. The evaluation shows that the execution time can be improved by a factor of 13 allowing UNADA to process large traces of trac in real time

    Online and Scalable Unsupervised Network Anomaly Detection Method

    No full text
    International audienceNowadays, network intrusion detectors mainly relyon knowledge databases to detect suspicious traffic. Thesedatabases have to be continuously updated which requires impor-tant human resources and time. Unsupervised network anomalydetectors overcome this issue by using “intelligent” techniquesto identify anomalies without any prior knowledge. However,these systems are often very complex as they need to explorethe network traffic to identify flows patterns. Therefore, theyare often unable to meet real-time requirements. In this paper,we present a new Online and Real-time Unsupervised NetworkAnomaly Detection Algorithm: ORUNADA. Our solution relieson a discrete time-sliding window to update continuously the fea-ture space and an incremental grid clustering to detect rapidly theanomalies. The evaluations showed that ORUNADA can processonline large network traffic while ensuring a low detection delayand good detection performance. The experiments performed onthe traffic of a core network of a Spanish intermediate Internetservice provider demonstrated that ORUNADA detects in lessthan half a second an anomaly after its occurrence. Furthermore,the results highlight that our solution outperforms in term

    Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks

    No full text
    International audienc
    corecore