Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems

被引:1
|
作者
Yan, Haonan [1 ,2 ]
Li, Xiaoguang [1 ]
Zhang, Wenjing [2 ]
Wang, Rui [1 ]
Li, Hui [1 ]
Zhao, Xingwen [1 ]
Li, Fenghua [3 ,4 ]
Lin, Xiaodong [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710126, Peoples R China
[2] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100045, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 101408, Peoples R China
关键词
Closed box; Feature extraction; Glass box; Detectors; Protocols; Training; Optimization; Adversarial traffic example; black-box evasion attack; model extraction attack; network intrusion detection system; transfer attack; CLASSIFICATION; ROBUSTNESS;
D O I
10.1109/TDSC.2023.3247585
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection systems (IDS) are often considered effective to thwart cyber attacks. Currently, state-of-the-art (SOTA) IDSs are mainly based on machine learning (ML) including deep learning (DL) models, which suffer from their own security issues, especially evasion attacks by using adversarial examples. However, previous studies mostly focus on extracted features rather than the traffic sample itself, and/or assume that the adversary knows the information of the target model more or less, which severely restricts attack feasibility in practice. In this paper, we re-investigate this problem in a more realistic label-only black-box scenario and propose a practical evasion attack strategy to solve the above limitations. In this newly considered case that the adversary morphs the traffic sample and only obtains the results accepted or rejected without other knowledge, we successfully leverage the model extraction and transfer attack to evade the detection. The entire attack strategy is automated and a comprehensive evaluation is performed. Final results show that the proposed strategy effectively evades seven typical ML-based IDSs and one SOTA DL-based IDS with an average success rate of over 75%. We also discuss the corresponding countermeasures against our attack, which finally highlight the need for effective defenses against our attack.
引用
收藏
页码:153 / 167
页数:15
相关论文
共 50 条
  • [1] A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems
    Mogg, Raymond
    Enoch, Simon Yusuf
    Kim, Dong Seong
    [J]. INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 51 - 63
  • [2] The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems
    Apruzzese, Giovanni
    Pajola, Luca
    Conti, Mauro
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 5152 - 5169
  • [3] Machine learning-based intrusion detection for SCADA systems in healthcare
    Öztürk, Tolgahan
    Turgut, Zeynep
    Akgün, Gökçe
    Köse, Cemal
    [J]. Network Modeling Analysis in Health Informatics and Bioinformatics, 2022, 11 (01)
  • [4] Machine learning-based intrusion detection for SCADA systems in healthcare
    Ozturk, Tolgahan
    Turgut, Zeynep
    Akgun, Gokce
    Kose, Cemal
    [J]. NETWORK MODELING AND ANALYSIS IN HEALTH INFORMATICS AND BIOINFORMATICS, 2022, 11 (01):
  • [5] Machine learning-based intrusion detection for SCADA systems in healthcare
    Tolgahan Öztürk
    Zeynep Turgut
    Gökçe Akgün
    Cemal Köse
    [J]. Network Modeling Analysis in Health Informatics and Bioinformatics, 2022, 11
  • [6] TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
    Debicha, Islam
    Bauwens, Richard
    Debatty, Thibault
    Dricot, Jean -Michel
    Kenaza, Tayeb
    Mees, Wim
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 185 - 197
  • [7] Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems
    Medina-Arco, Joaquin Gaspar
    Magan-Carrion, Roberto
    Rodriguez-Gomez, Rafael Alejandro
    Garcia-Teodoro, Pedro
    [J]. SENSORS, 2024, 24 (02)
  • [8] Machine learning-based intrusion detection algorithms
    Tang, Hua
    Cao, Zhuolin
    [J]. Journal of Computational Information Systems, 2009, 5 (06): : 1825 - 1831
  • [9] MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review
    Gulshan Kumar
    Kutub Thakur
    Maruthi Rohit Ayyagari
    [J]. The Journal of Supercomputing, 2020, 76 : 8938 - 8971
  • [10] A machine learning-based intrusion detection for detecting internet of things network attacks
    Saheed, Yakub Kayode
    Abiodun, Aremu Idris
    Misra, Sanjay
    Holone, Monica Kristiansen
    Colomo-Palacios, Ricardo
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 9395 - 9409