A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems

被引:0
|
作者
Monkam G.F. [1 ]
De Lucia M.J. [2 ]
Bastian N.D. [1 ]
机构
[1] Army Cyber Institute, Department of Electrical Engineering & Computer Science, United States Military Academy, West Point, 10996, NY
[2] Army Research Laboratory, U.S. Army Combat Capabilities Development Command, Aberdeen Proving Ground, 21005, MD
来源
Computers and Security | 2024年 / 144卷
关键词
Data poisoning detection; Machine learning security; Network security; Topological data analysis; Unsupervised learning;
D O I
10.1016/j.cose.2024.103929
中图分类号
学科分类号
摘要
Data poisoning attacks pose a significant security risk to network security software that utilizes machine learning (ML) for network intrusion detection. As network traffic continues to surge, ML becomes indispensable in detecting and characterizing malicious actors attempting to infiltrate computer networks. However, conventional ML assumes a benign environment, leaving room for adversaries to violate this assumption during the training phase. Detecting data poisoning attacks proves to be a challenging task, as attackers employ subtle alterations in the training data to create backdoors, trojans or triggers. Traditional techniques for addressing data poisoning attacks often focus only on enhancing ML model robustness rather than detecting poisoned data, necessitating the development of novel, more effective approaches. Hence, there is an urgent need to develop new methods for identifying poisoned data, ensuring the security of ML. We introduce a novel approach that harnesses the power of topological data analysis and unsupervised learning, enabling the early identification of poisoned data before training an ML model for network intrusion detection. Leveraging our approach, the extraction of topological features and subsequent application of clustering techniques leads to the creation of new clusters exclusively composed of poisoned data for removal prior to ML model training. © 2024
引用
收藏
相关论文
共 50 条
  • [41] Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems
    Paya, Antonio
    Arroni, Sergio
    Garcia-Diaz, Vicente
    Gomez, Alberto
    COMPUTERS & SECURITY, 2024, 136
  • [42] Learning to Detect: A Data-driven Approach for Network Intrusion Detection
    Tauscher, Zachary
    Jiang, Yushan
    Zhang, Kai
    Wang, Jian
    Song, Houbing
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [43] Topological data analysis and machine learning
    Leykam, Daniel
    Angelakis, Dimitris G.
    ADVANCES IN PHYSICS-X, 2023, 8 (01):
  • [44] Analysis of Machine Learning Techniques Based Intrusion Detection Systems
    Sharma, Rupam Kr.
    Kalita, Hemanta Kumar
    Borah, Parashjyoti
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 485 - 493
  • [45] Deep behavioral analysis of machine learning algorithms against data poisoning
    Paracha, Anum
    Arshad, Junaid
    Farah, Mohamed Ben
    Ismail, Khalid
    International Journal of Information Security, 2025, 24 (01)
  • [46] Machine Learning Based Network Intrusion Detection
    Lee, Chie-Hong
    Su, Yann-Yean
    Lin, Yu-Chun
    Lee, Shie-Jue
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 79 - 83
  • [47] Parameterizing poisoning attacks in federated learning-based intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [48] Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems
    Chale, Marc
    Bastian, Nathaniel D.
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 207
  • [49] Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning
    Maabreh M.
    Obeidat I.
    Elsoud E.A.
    Alnajjai A.
    Alzyoud R.
    Darwish O.
    International Journal of Interactive Mobile Technologies, 2022, 16 (14) : 123 - 135
  • [50] Network intrusion detection using machine learning approaches: Addressing data imbalance
    Ahsan, Rahbar
    Shi, Wei
    Corriveau, Jean-Pierre
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2022, 7 (01) : 30 - 39