- Open Access
- Total Downloads : 25
- Authors : Pawan Poonia, Vineet Kumar, Asst. Prof. Chitra Nasa
- Paper ID : IJERTCONV5IS10015
- Volume & Issue : ICCCS – 2017 (Volume 5 – Issue 10)
- Published (First Online): 24-04-2018
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Performance Evaluation of Network based Intrusion Detection Techniques with Raspberry Pi – a Comparative Analysis
Pawan Poonia
Dept. of Computer Science, HMR Institute of Technology and Management, Delhi
Vineet Kumar
Dept. of Computer Science, HMR Institute of Technology and Management, Delhi
Asst. Prof. Chitra Nasa
Dept. of Computer Science, HMR Institute of Technology and Management, Delhi
Abstract:- Initially, what is intrusion? An intrusion or an intruder is someone who is accessing the resources in a network without being a legitimate user to use that resource. It has its certain types; an intruder can be a misfeasor or a masquerade. It can be someone who is a legitimate user but isnt given a privilege to use the service it is already been using or someone who is not a legitimate user.
Intrusion detection is based on computability and analysis based on statistics[1]. Characteristics of computational intelligence (CI) systems, such as adaptation, fault tolerance, high computational speed and error resilience in the face of noisy information t the requirements of building a good intrusion detection model[1].
Somehow, intrusion is inevitable now as with the increased popularity of network now a day everything is being done or shared staying in the network and wireless networks being prone to so many attacks our information is something which needs to be secured. So in order to provide security to our network we try to find the intrusion in our network by some methods. And with the popularity of the internet we all have been using it at our homes but with the lack of knowledge people around might not realise router is the most important electronic device at our home as it connects all our devices to the internet and makes our information prone to hacking. And router being an intelligent device can analyse incoming and outgoing packets so other packets which could be sent by the intruder can be taken care of, in this paper we are addressing this issue and hence it shows the possibility of using a Raspberry Pi as a router and an Intrusion Detection System(IDS) in a home environment to increase network security.
Keywords: Intrusion, Network, Information, Raspberry Pi, Intrusion Detection System (IDS), Security.
-
INTRODUCTION
Not only the enterprises but also the home networks are vulnerable to the hacking as they are also targeted with the cyber-attacks as now a days everything is being done online using the internet. From recharging DTH services to paying electricity bills and from shopping to sending money everything is being done using the internet. E- Banking being used the most these days and due to attacks on home networks E-banking users are being targeted the most. And increased numbers of devices connected to the home network makes the situation worse risking private data and financial data and identity theft. Due to a limited
knowledge about these issues they cannot protect themselves. And rely just on anti-virus and anti-malware applications.
IDS arms your business against attacks by continuously monitoring network activity, ensuring all activity is normal. If IDS detects malicious activity, it responds immediately by destroying the attacker's access and shutting down the attack. IDS reads network traffic and looks for patterns of attacks or signatures, if a signature is identified, IDS sends an alert to the Management Console and a response is immediately deployed.
So as to avoid such attacks one needs to have knowledge and it is not feasible in every case. Home users can only make it through using a small scale solution which will include low installation cost, low maintenance and low implementation. One possible solution is to run intrusion detection software, for example Snort, on a Raspberry Pi. The device is affordable and flexible as it can run a number of operating systems and might therefore be a very suitable device to provide an entry level upgrade in network protection [2]. And a perfect replacement for a home router.
-
HISTORY
Intrusion detection journey started in early 1980s after the evolution of internet. During the late 1980s, with a growing number of shared networks, enterprise system administrators all over the world began adopting intrusion detection systems. But intrusion started in home networks as well with the increased popularity of internet and online transactions and for the same in 2013 a study was made on the possibility on using a Raspberry as an IDS in a home network. They performance tested a Raspberry Pi Model B+ running the operating system IPFire and the intrusion detection software Snort. The results from this study showed that a Raspberry Pi could be used as IDS [2].
70000
60000
50000
40000
30000
20000
10000
0
Cyber
incidents
2006
2007
2008
2009
2010
2015
Fig 1. Number of Cyber Incidents Reported
The above chart from US-CERT shows how the cyber incidents rose in current internet network environment; this gives requirement of IDS deployment in network security model[5].
Previously done studies suggests that it had following limitations:
-
A limit on how many Snort-rules could be used due to limitations in memory[2].
-
A noticeable degradation in throughput when Snort was active[2].
-
-
INTRUSION DETECTION SYSTEMS
An Intrusion Detection System (IDS) is basically a system comprises both hardware as well as software that monitors a network and detects any possible intrusion by statistical analysis using computational intelligence. It acts like an alarm or giving us the warning and it is completely different from the firewall. Firewall acts as a gateway for the packets and simply works on the rules defined by the administrator;it filters the traffic from the internet and will either pass the packet or will drop it whereas IDS will monitor the traffic from the internet for all possible attacks from intruder.
-
IDS Attacks
The various IDS attacks are as shown in figure 2:
IDS Attacks
Denial Of Service (DOS)
Spoofing Attack
Eavesdropping Attack
Application Level Attack
Logon Abuse Attack
U2R Attack
Fig. 2: IDS Attacks
-
DOS Attack: In DOS attack the targeted system or network is flooded with traffic resulting in flooding and overflow of bandwidth using multiple systems. The DOS attacks disable the services of the host connected to internet temporarily or indefinitely.
-
Spoofing Attack: Spoofing is said to be when an attacker impersonates another device or user on the network to get control over the system. Man-in-the-middle attack is carried out by spoofing IP address and ARP.
-
Eavesdropping Attack: A form of external attack where the critical information is sniffed which is transmitted over a network to acquired sensitive information like password, confidential information or session tokens.
-
Application-level Attack: In application level attacks the attacker attacks the application layer of network and exploit its weaknesses. SQL injections, Trojans, viruses, etc. are the methods to do so.
-
Logon Abuse Attack: A successful logon abuse attack would bypass the authentication and access control mechanisms and grant a user with more privileges that authorized [3].
-
User to Root Attack: An unauthorized person tries to access the system or root through the network. Buffer overflow attack is a typical U2R attack which occur when a web service receives more data than it buffer[3].
-
-
IDS Types
An intrusion detection system is of two types as shown in figure 3: –
-
HIDS (Host based IDS)
-
NIDS (Network based IDS)
-
Intrusion Detection System
HIDS (Host Based)
NIDS
(Network Based)
Fig. 3: Classification of IDS
-
Host-based IDS (HIDS): The host-based intrusion detection system basically monitors and analyses the internals of a computing system and the network packets on its interfaces. It checks intrusion in local system called host system. HIDS gets data from system logs and other logs generated by operating system and monitor and audit it. Host based system trust strongly on audit trail[4].
-
Network-based IDS (NIDS): The network-based intrusion detection systemdetects all malicious activity by monitoring the network traffic. The NIDS acts as a network sensor. The NIDS audits the network attacks while packets moving across the network [4]. NIDS can capture and analyse data to detect known attacks or illegal activities or analyse network and application protocol activity to identify anomalous and suspicious activity by traffic
scanning [5]. NIDS can also be referred as packet sniffers, because it captures and collect the data in the form of internet packets passing through communication mediums
[6].-
Function of IDS
There are four key IDS function as shown in figure 4:
-
Data Collection
-
Feature Selection
-
Analysis
-
Action
-
Data Collection
Feature Selection
Analysis
Action
Fig. 4: Functions of IDS
-
Data Collection: The data collection module passes the data as input to IDS system. This data is saved in a file and is analysed. The data consist of system logs, kernel messages, port-map messages, login messages, etc. [7].
-
Feature Selection: After collections of data feature are selected i.e. specific functions are applied on the data. Various algorithms like filter algorithm or correlation based algorithm are used for feature selection[8].
-
Analysis:Once the selection of feature is completed the analysis of data is done for additional useful information. Overview system activity is analysed by changing parameters. The analysis reveals any type of intrusion or network problem.
-
Action: After detecting network problem or system intrusion preventive actions are takes by IDS tools to prevent attack on the network. The IDS also inform the administrator with all the required data through email/alarm icons or it can play an active part in the system by dropping packets so that it does not enter the system or close the ports [4].
-
IDS Techniques
There are mainly two IDS techniques as shown in figure 5:
-
Signature-based IDS
-
Anomaly-based IDS
-
IDS
Techniques
Signature Based
Anomaly Based
Fig. 5: IDS Techniques
-
Signature-based IDS: In Signature based detection the system will look for a particular pattern or rule in network packets. Each data set is labelled as normal intrusive and on these basis machine learning algorithms are used to teach and train each data set. Depending on the robustness and seriousness of a signature that is activated within the system, some alarm response or notification should be sent to the right authorities[9]. Techniques used in signature based detection are:
-
Expression matching: In this it searches for the stream of events like log entries for the happening of exact pattern[4].
-
State transition analysis: This model attacks the state or the transitions in the network[4].
-
-
Anomaly-based IDS: An Anomaly based detection technique will look for an anomaly or an outlier in a sequence of packets. Anomaly based detection requires machine learning by comparing new behaviour against the established model. Whenever there is a deviation in the behaviour pattern it will report it as possible intrusion. It identifies anomalies as deviations from normal behaviour and automatically detects any deviation from it, flagging the latter as suspect. Thus these techniques identify new types of intrusion as deviations from normal usage [9]. Techniques used in anomaly based detection are:
-
Statistical Models: The statistical model shows the output as a statistical value[4].
-
Cognition Based Detection Techniques:It works on audit of data. The set of predefined rules for the classes and attributes are identified from training dataset [10].
-
-
-
RASPBERRY PI
The Raspberry pi is a series on single board computers developed in United Kingdom to enhance the computer education in schools and colleges. It can support all the peripheral devices as well. The Raspberry Pi 3 is the third generation Raspberry Pi. It replaced the Raspberry Pi 2 Model B in February 2016. Compared to the Raspberry Pi 2 it has:
-
A 1.2GHz 64-bit quad-core ARMv8 CPU
-
802.11n Wireless LANS
-
Bluetooth 4.1 (BLE):
-
1GB RAM
-
4 USB ports
-
Ethernet port
-
40 GPIO pins full HDMI port
-
Display interface (DSI)
-
VideoCore IV 3D graphics core
-
-
RASPBIAN
The Raspbian is a free operating system based on Debian optimized for the Raspberry Pi hardware. Following are the features of Raspbian:
-
Kernel 4.1.18+ #846
-
15 secs boot (on RPi 2B)
-
31 MB RAM used
-
477 MB disk space used
-
Support for RPi B, RPi B+, RPi 2B and the new RPi 3B
-
DHCP client enabled
-
SSHD enabled
-
-
PRESENTLY RUNNING NETWORK IDS The IDS presently used by most of the users are:
-
Snort
Snort is a free and open source and signature based intrusion detection system which is capable of real time traffic analysis and packet logging. Snort was developed by Martin Roesch in 1998. Snort has no real GUI or easy to use administrative console. Some features of Snort are:
-
Can work on any operating system
-
Protocol examining capability
-
Condition examining capability
-
Packet reassembly capability
-
-
Suricata
Suricata is a free and open source which fast and robust network threat detection engine. It is capable of real time intrusion detection, inline intrusion prevention and network security monitoring. It inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. Some features of Suricata are:
-
Supports all operating system
-
Along with the IPS
-
Automatic detection of protocols with high performance
-
Network Security Monitoring
-
Filtering of alerts and events
-
Output format support many other tools to analyse data
-
-
Kismet
Kismet is a wireless network detector, sniffer, and intrusion detection system. Kismet works predominately with Wi-Fi (IEEE 802.11) networks, but can be expanded via plug-ins to handle other network types. Some features of Kismet are:
-
802.11 sniffing
-
Standard PCAP logging (compatible with Wireshark, TCPDump, etc.)
-
Client/Server modular architecture
-
Plug-in architecture to expand core features
-
Multiple capture source support
-
Live export of packets to other tools via tun/tap virtual interfaces
-
Distributed remote sniffing via liht-weight remote capture
-
XML output for integration with other tools
-
-
A Quick Comparison
It has been evaluated that on comparing Snort and Suricata it is observed that Snort should be preferred over Suricata. As shown in report [11]. The precision of snort is 81 percent with false positives of 3.6 percent. Whereas, in Suricata the precision is 91 percent but the false positive is 5.2 percent.
And according to the paper [12] snort is preferred as it has following advantages over Kismet i.e., lesser false negatives, high throughput and better error reporting and recovery.
-
-
EXPERIMENT
We tested the network against a home Router, Raspberry Pi Model-3, Raspberry Pi Model-B+ and Raspberry Pi Model- B with Snort installed in all Raspberry Pi. Following tests are conducted for the experiment:
-
On The Basis of Rule Set A (Default Snort Rules)
-
TCP capacity of the device over Ethernet
-
TCP capacity of the device wirelessly
-
TCP capacity of the device with window size of 8000 over Ethernet
-
TCP capacity of the device with window size of 8000 wirelessly
-
UDP capacity of the device over Ethernet
-
UDP capacity of the device wirelessly
-
-
On The Basis of Rule Set B (Customised Snort Rules)
-
TCP capacity of the device over Ethernet
-
TCP capacity of the device wirelessly
-
TCP capacity of the device with window size of 8000 over Ethernet
-
TCP capacity of the device with window size of 8000 wirelessly
-
UDP capacity of the device over Ethernet
-
UDP capacity of the device wirelessly
-
-
Snort Turned Off
-
TCP capacity of the device over Ethernet
-
TCP capacity of the device wirelessly
-
TCP capacity of the device with window size of 8000 over Ethernet
-
TCP capacity of the device with window size of 8000 wirelessly
-
UDP capacity of the device over Ethernet
-
UDP capacity of the device wirelessly
-
-
Performing Security tests
-
Mac Filtering
-
Content Control
-
Shell Code
-
Virus
-
Network Scanning
-
Denial of Service
-
CPU Usage: The lower the better
600
400
200
0
Single-threaded(sec) Multi-threaded(sec) Model B+ Model A+ Zero Pi-2 Pi-3
-
-
RESULT
Bandwidth in Mbps
-
Network Analysis
Chart Title
100
90
80
70
60
50
40
30
20
10
0
CPU Performance: The higher the better
80
60
40
20
0
CPU Performance
Model B+ Model A+ Zero Pi-2 Pi-3
TCP
Fig 7. Comparison on Basis of CPU Usage
TCP Window 8K
Fig 6: Comparison of Raspberry Pi 2 & Home Router over Ethernet
Table 1: Comparison of Raspberry Pi 3 & Home Router over Ethernet
Snort
Off
Snort(Default
Rules)
Snort(Custom
Rules)
Home
Router
TCP
(Mbps)
94.3
94.2
94.3
94.9
TCP
Window 8K (Mbps)
46.2
46.2
46.2
49.5
UDP
(Mbps)
1.05
1.05
1.05
1.07
Jitter (ms)
0.374
0.579
0.459
0.430
Loss
0/165
3/169
1/150
0/162
Fig 8. Comparison On Basis of CPU Performance
Table 2: Comparison of Raspberry Pi 3 & Home Router Wirelessly
Snort Off
Snort(Default Rules)
Snort(Custom Rules)
Home Router
TCP
(Mbps)
19.2
13.2
18.2
26.0
TCP
Window 8K
(Mbps)
12.9
10.6
12.7
17.6
UDP
(Mbps)
1.11
1.05
1.05
1.05
Jitter
(ms)
1.872
2.954
2.473
2.235
Loss
0/170
1/160
1/161
0/159
-
Benchmarks
On comparing performances of different models of Raspberry Pi it is asserted that Raspberry Pi Model-3 is superior amongst other models on the basis of CPU performance, memory management and power consumption. Below are the graphs for its comparison:
Power Consumption: The
lower the better
0.8
0.6
0.4
0.2
0
Idle(A)
Load(A)
Model B+ Model A+ Zero Pi-2 Pi-3
Fig 9. Comparison On Basis of Power Consumption
-
Security Features
A comparison of different security features is made between Raspberry Pi and Home Router to verify how effective the intrusion detection system is against network attacks. The comparison table of security feature is as shown:
Table 3: Comparison of Security Features Raspberry Pi & Home Router
Raspberry Pi
Router
Security Feature/Rules
Custom Rules
Default Rules
Default
Mac Filtering
Yes
Yes
Yes
Content Control
Yes
Yes
Yes
Shell Code
No
Yes
No
Virus
Yes
Yes
No
Network Scan
Yes
Yes
No
DOS
No
Yes
No
-
-
CONCLUSION
The main objective of this paper is to provide an overview of necessity and utility of intrusion detection system. This paper covers allaspects of IDS which includes its types, functions and techniques, types of attack which may occur on network, overview of hardware and software used to implement Raspberry Pi as a replacement to a router for a secure home network. This paper also covers present scenario and their comparison which includes types of open source IDS available presently and related hardware.
On comparing different IDS, it was observed that Snort is the best alternative amongst the three as it overcomes the shortcomings of Kismet and Suricata. Snort is found to have a better precision with less number of false positives. Moreover, the error reporting in Snort unimpeachable.
Raspberry Pi Model-3 is best suited for this scenario which could be inferred from the charts above. Raspberry Pi Model-2 and Raspberry Pi Model-B+ has few shortcomings which are power consumption level, poor memory management and lower throughput. Moreover, Raspberry Pi Model-3 has dedicated Wi-Fi adapter which enables it to be used as a wireless access point.
A domestic Home Router is not capable of analysing incoming and outgoing traffic. Thus lacks in providing security to the devices connected to the network. The above table depicts the same. Hence to make the home network more secure Raspberry Pi coupled with Snort is great alternate to a relatively insure Home Router. This hardware can be configured precisely to the needs of the customer for better security solution which includes DOS and DDOS protection, anti-malware and anti-virus alerts, content control and other numerous features as per requirements.
-
REFERENCE
-
The Use of Computational Intelligence in Intrusion Detection Systems: A Review (2008) by Shelly Xiaonan, Wu Wolfgang Banzhaf, Shelly Xiaonan, Wu Wolfgang Banzhaf http://www.mun.ca/computerscience/research/MUN-CS-2008- 05.pdf
-
IDS on Raspberry Pi A Performance Evaluation by Andreas ASPERNÄS,Thommy SIMONSSON https://www.eecis.udel.edu/~cshen/367/Assignments/IDS-RPi.pdf
-
Karthikeyan. K.R and A. Indra- Intrusion Detection Tools and Techniques a Survey
http://www.ijcte.org/papers/260-G778.pdf
-
INTRUSION DETECTION SYSTEM A STUDY by Dr.S.Vijayarani and Ms. Maria Sylviaa.S http://airccse.org/journal/ijsptm/papers/4115ijsptm04.pdf
-
Asmaa Shaker Ashoor (Department computer science, Pune University) Prof.Sharad Gore (Head department statistic, Pune
University), Importance of Intrusion Detection System (IDS), International Journal of Scientific & Engineering Research, Vol. 2, Issue 1, Jan 2011. http://www.ijser.org/researchpaper%5CImportance_of_Intrusion_ Detection_System.pdf
-
An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications by Hussain Ahmad MadniUppal , MemoonaJaved and M.J. Arshad, International Journal of Computer Science and Telecommunications [Volume 5, Issue 2, February 2014] http://www.ijcst.org/Volume5/Issue2/p4_5_2.pdf
-
Intrusion Detection Data: Collection and Analysis by Robert F. Erbacher and Bill Augustinehttps://pdfs.semanticscholar.org/4436/e1055b2d9915d6 9295d813c4ccabcb2957cb.pdf
-
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System by You Chen, Yang Li, Xue-Qi Cheng, and Li Guohttp://hiplab.mc.vanderbilt.edu/~ychen/survey2006.pdf
-
Vera Marinova-Boncheva- A Short Survey of Intrusion Detection Systems-. Bulgarian academy of sciences http://www.iit.bas.bg/PECR/58/23-30.pdf
-
SriramSundarRajan, Vijaya Krishna Cherukuri- An Overview of Intrusion Detection Systems. http://www.idt.mdh.se/kurser/ct3340/ht09/ADMINISTRATION/I RCSE09-submissions/ircse09_submission_18.pdf
-
A COMPARATIVE ANALYSIS OF THE SNORT AND SURICATA INTRUSION-DETECTION SYSTEMS byEugene Albin
http://www.dtic.mil/dtic/tr/fulltext/u2/a552115.pdf
-
A Performance Metrics Scorecard Based Approach to Intrusion Detection System Evaluation for Wireless Network by Rupinder Singh &Dr.Jatinder Singh https://globaljournals.org/GJCST_Volume12/1-A-Performance- Metrics-Scorecard-Based-Approach.pdf