Cross Layer Techniques for Intrusion Tolerant Networks

Lead Research Organisation: Queen's University Belfast
Department Name: Sch of Electronics, Elec Eng & Comp Sci

Abstract

The proliferation of wireless networks over the past decade has made security a major concern for these networks and the applications that have to use them. Wireless networks have fundamental characteristics that make them significantly different from traditional wired networks, particularly with regard to security and reliability. Moreover there is an increasing trend for access to services residing on fixed (e.g. enterprise) networks via wireless access. Therefore the design of secure and reliable wireless networks presents a major challenge to the designers of next generation networks with general public wireless access. It is also expected that many future networks will have to live under the threat of attacks as a matter of course. Current research attempts to secure networks against all types of attack, at all times and generally irrespective of the cost to the performance of the network. This research proposal aims to investigate a new type of integrated, flexible, and intelligent security architecture for providing tolerance to intrusion attacks against next generation networks with wireless access. Thus our goal is not to prevent intrusions but to enable network architectures to withstand them. Central to the work will be the design of a distributed Intrusion tolerance system that is based on a cross layer detection and mitigation approach. As such, intrusion detection and mitigation will be integrated within the layered architecture of the network so that the network has an intelligent view of the overall level of threat(s) posed at any time throughout the network. This approach brings a number of significant advantages over existing intrusion detection systems (IDS) particularly when applied to wireless access networks that have to withstand some level of attacks over prolonged periods.

Publications

10 25 50
 
Description The use of cross layer metrics has enabled a "vectorised" approach to trust management frameworks that can cover a much greater "threat surface" for networks, therefore making them much more resilient to attacks.
Exploitation Route (i) further research into trust management frameworks the a multi-vectored in nature and can be applied to IOT paradigms
(ii) commercial exploitation
Sectors Aerospace, Defence and Marine,Creative Economy,Digital/Communication/Information Technologies (including Software),Electronics,Leisure Activities, including Sports, Recreation and Tourism,Manufacturing, including Industrial Biotechology,Retail,Security and Diplomacy,Transport,Other

 
Description Some of the research lead on to security measures for M2M communications, as used in IoT. This achieved in further impact by: (i) press release of "Chameleon wifi virus", world's first radio spread virus, received extensive press coverage worldwide. (ii) some of the detection mechanisms have been integrated into TOM LTD's "SpriteGuard" product range. This is now used in a number leading 4* and 5* hotels throughout the UK and USA.
First Year Of Impact 2013
Sector Aerospace, Defence and Marine,Digital/Communication/Information Technologies (including Software),Electronics,Retail,Security and Diplomacy
Impact Types Societal,Economic

 
Description Queen's University of Belfast
Amount £58,000 (GBP)
Funding ID independent researcher scholarship EEECS 
Organisation Queen's University Belfast 
Sector Academic/University
Country United Kingdom
Start 10/2012 
End 09/2014