Skip to content

A research-driven approach leveraging external adversary nodes for passive listening to detect IDS positions, map network topology, and identify security blind spots in Underwater Acoustic Networks (UWANs).

License

Notifications You must be signed in to change notification settings

Vivek-Tate/IDS-Detection-and-Exploiting-Vulnerabilities-in-UWAN

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

External Adversary-Based Localisation of Network Topology and Intrusion Detection System in UW-ASN

Underwater Sensor Network

Project Overview

This repository contains the implementation of the research project titled "External Adversary-Based Localisation of Network Topology and Intrusion Detection System in UW-ASN". This study addresses the security vulnerabilities in Underwater Acoustic Sensor Networks (UW-ASNs) by investigating how external adversaries can localise network nodes and improve the strategic deployment of Intrusion Detection Systems (IDS) for enhanced security.

Features & Objectives

  • Network Simulation – Simulating UW-ASNs using NetSim v14.1.
  • Topology Analysis – Identifying network structure vulnerabilities.
  • IDS Deployment – Strategic positioning of IDS for optimal security.
  • Adversarial Threat Modelling – Assessing potential attack vectors.
  • Machine Learning for Localisation – Implementing clustering & signal-based positioning techniques.

Project Structure

├── docs/                         # Documentation and reports
│   ├── images/                   # Contains network topology, IDS placement, and result visualizations
│   ├── reports/                   # Research findings and analysis reports
├── src/                          # Source code directory
│   ├── pre_processing/           # Scripts for cleaning and structuring raw data
│   ├── prediction/               # Machine learning models for threat localization
├── data/                         # Dataset directory
│   ├── processed/                # Preprocessed data ready for model input
│   ├── raw/                      # Raw dataset files including sensor logs and adversary positions
├── model/                        # Model configurations, constants, and file paths
├── README.md                     # Project documentation
├── main.py                       # Main script to execute the full pipeline
├── requirements.txt              # Required dependencies for setup

Installation & Setup

Prerequisites

  • Python 3.11+
  • NetSim Standard v14.1 Licensed
  • Visual Studio (for C++ based network simulation modifications)
  • PyCharm

Setup Instructions

  1. Clone the repository:
    git clone [https://github.com/yourusername/uwasn-security.git
    cd uwasn-security](https://github.com/Vivek-Tate/IDS-Detection-and-Exploiting-Vulnerabilities-in-UWAN.git)
  2. Install dependencies:
    pip install -r requirements.txt

Datasets & Analysis

Acoustic Measurements File

  • Contains logs of packets intercepted by adversary nodes. Acoustic Measurements File

Device Properties File

  • Provides coordinates of adversary nodes for localisation. Device Properties File

Technical Implementation

  • Network Simulation: Utilizes NetSim v14.1 with a modified C++ based DBR protocol. Device Properties File
  • Topology Analysis: Implements RSSI-based distance estimation and trilateration. Device Properties File
  • IDS Deployment: Leverages DBScan clustering for optimized security node placement.
  • Threat Modelling: Assesses passive adversary capabilities through network interception.

Results & Key Findings

  • Node localisation accuracy improved from ~15% to ~65% using a hybrid approach.
  • Strategic IDS placement significantly reduces undetected threats.
  • Low false positives in adversary detection using optimised clustering techniques.

Device Properties File

License

See the LICENSE file for details.


Feel free to reach out via the project's GitHub repository for any issues or contributions. Enjoy exploring!

About

A research-driven approach leveraging external adversary nodes for passive listening to detect IDS positions, map network topology, and identify security blind spots in Underwater Acoustic Networks (UWANs).

Topics

Resources

License

Stars

Watchers

Forks

Languages