A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems

被引:0
|
作者
Monkam G.F. [1 ]
De Lucia M.J. [2 ]
Bastian N.D. [1 ]
机构
[1] Army Cyber Institute, Department of Electrical Engineering & Computer Science, United States Military Academy, West Point, 10996, NY
[2] Army Research Laboratory, U.S. Army Combat Capabilities Development Command, Aberdeen Proving Ground, 21005, MD
来源
Computers and Security | 2024年 / 144卷
关键词
Data poisoning detection; Machine learning security; Network security; Topological data analysis; Unsupervised learning;
D O I
10.1016/j.cose.2024.103929
中图分类号
学科分类号
摘要
Data poisoning attacks pose a significant security risk to network security software that utilizes machine learning (ML) for network intrusion detection. As network traffic continues to surge, ML becomes indispensable in detecting and characterizing malicious actors attempting to infiltrate computer networks. However, conventional ML assumes a benign environment, leaving room for adversaries to violate this assumption during the training phase. Detecting data poisoning attacks proves to be a challenging task, as attackers employ subtle alterations in the training data to create backdoors, trojans or triggers. Traditional techniques for addressing data poisoning attacks often focus only on enhancing ML model robustness rather than detecting poisoned data, necessitating the development of novel, more effective approaches. Hence, there is an urgent need to develop new methods for identifying poisoned data, ensuring the security of ML. We introduce a novel approach that harnesses the power of topological data analysis and unsupervised learning, enabling the early identification of poisoned data before training an ML model for network intrusion detection. Leveraging our approach, the extraction of topological features and subsequent application of clustering techniques leads to the creation of new clusters exclusively composed of poisoned data for removal prior to ML model training. © 2024
引用
收藏
相关论文
共 50 条
  • [1] Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems
    Venkatesan, Sridhar
    Sikka, Harshvardhan
    Izmailov, Rauf
    Chadha, Ritu
    Oprea, Alina
    de Lucia, Michael J.
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [2] Adversarial attacks against supervised machine learning based network intrusion detection systems
    Alshahrani, Ebtihaj
    Alghazzawi, Daniyal
    Alotaibi, Reem
    Rabie, Osama
    PLOS ONE, 2022, 17 (10):
  • [3] Data poisoning attacks against machine learning algorithms
    Yerlikaya, Fahri Anil
    Bahtiyar, Serif
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 208
  • [4] Securing Machine Learning Against Data Poisoning Attacks
    Allheeib, Nasser
    International Journal of Data Warehousing and Mining, 2024, 20 (01)
  • [5] A machine learning-based intrusion detection for detecting internet of things network attacks
    Saheed, Yakub Kayode
    Abiodun, Aremu Idris
    Misra, Sanjay
    Holone, Monica Kristiansen
    Colomo-Palacios, Ricardo
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 9395 - 9409
  • [6] Approach to Detecting Attacks against Machine Learning Systems with a Generative Adversarial Network
    Kotenko, I.V.
    Saenko, I.B.
    Lauta, O.S.
    Vasilev, N.A.
    Sadovnikov, V.E.
    Pattern Recognition and Image Analysis, 2024, 34 (03) : 589 - 596
  • [7] Data Poisoning Attacks Against Federated Learning Systems
    Tolpegin, Vale
    Truex, Stacey
    Gursoy, Mehmet Emre
    Liu, Ling
    COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 480 - 501
  • [8] A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models
    Talty, Kevin
    Stockdale, John
    Bastian, Nathaniel D.
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [9] Synthetic Data Generation With Machine Learning for Network Intrusion Detection Systems
    Newlin, Marvin
    Reith, Mark
    DeYoung, Mark
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 785 - 789
  • [10] A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems
    Mogg, Raymond
    Enoch, Simon Yusuf
    Kim, Dong Seong
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 51 - 63