On and off the manifold: Generation and Detection of adversarial attacks in IIoT networks

被引:0
|
作者
Al-Fawa'reh, Mohammad [1 ]
Abu-khalaf, Jumana [1 ]
Janjua, Naeem [1 ,2 ]
Szewczyk, Patryk [1 ]
机构
[1] Edith Cowan University, Centre of AI and Machine Learning (CAIML), School of Science, 270 Joondalup Dr, Joondalup,WA 6027, Australia
[2] Flinders University, School of Science and Engineering, 1284 South Road Clovelly Park, Tonsley,SA 502, Australia
关键词
Adversarial machine learning - Cyber attacks - Deep neural networks - Deep reinforcement learning - Generative adversarial networks - Network intrusion - Reinforcement learning;
D O I
10.1016/j.jnca.2024.104102
中图分类号
学科分类号
摘要
Network Intrusion Detection Systems (NIDS), which play a crucial role in defending Industrial Internet of Things (IIoT) networks, often utilize Deep Neural Networks (DNN) for their pattern recognition capabilities. However, these systems remain susceptible to sophisticated adversarial attacks, particularly on-manifold and off-manifold attacks, which skillfully evade detection. This paper addresses the limitations in existing research, focusing primarily on: the predominant focus on off-manifold attacks, while often overlooking subtler yet potent on-manifold attacks; a lack of consideration for the functional behavior of these attacks; reliance on detailed knowledge of the target NIDS for creating attacks; and the need for detailed knowledge about the creation process of adversarial attacks for effective detection. This paper introduces the Saliency Adversarial Autoencoder (SAAE), designed for generating on-manifold attacks through latent space perturbations. This dual-space perturbation approach enables SAAE to efficiently create stealthy attacks that blend with normal network behavior, posing significant challenges to state-of-the-art (SOTA) NIDS. To counter these advanced threats, we propose an attack-agnostic defence mechanism utilizing a fusion-based Autoencoder (AE) with disentangled representations. This defence is adept at detecting threats within the manifold, significantly enhancing NIDS robustness. Comparative assessments with SOTA DNN and Deep Reinforcement Learning (DRL) models highlight the effectiveness of our approach. The SAAE model markedly reduces True Positive Rates (TPR) in these systems. For DNNs, TPR dropped from 99.72% to 41.5%, and for DRLs, from 95.6% to 63.94%. Conversely, our defence model shows high TPR in detecting these attacks, registering 94% for DNNs and 92% for DRLs. Additionally, we release our dataset, named OOM-X-IIoTID1, which includes On/Off manifold adversarial attacks, a first in the field, to facilitate further research and development in cybersecurity. © 2024
引用
收藏
相关论文
共 50 条
  • [1] Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks
    Zhang, Xueqin
    Zhou, Yue
    Pei, Songwen
    Zhuge, Jingjing
    Chen, Jiahao
    IEEE ACCESS, 2020, 8 (08): : 10989 - 10996
  • [2] Cyber Attacks Detection Based on Generative Adversarial Networks
    Shi, Aining
    2021 2ND ASIA CONFERENCE ON COMPUTERS AND COMMUNICATIONS (ACCC 2021), 2021, : 111 - 114
  • [3] Detection of Adversarial DDoS Attacks Using Generative Adversarial Networks with Dual Discriminators
    Shieh, Chin-Shiuh
    Nguyen, Thanh-Tuan
    Lin, Wan-Wei
    Huang, Yong-Lin
    Horng, Mong-Fong
    Lee, Tsair-Fwu
    Miu, Denis
    SYMMETRY-BASEL, 2022, 14 (01):
  • [4] Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks
    Shieh, Chin-Shiuh
    Thanh-Tuan Nguyen
    Lin, Wan-Wei
    Lai, Wei Kuang
    Horng, Mong-Fong
    Miu, Denis
    ELECTRONICS, 2022, 11 (13)
  • [5] Gradient correlation based detection of adversarial attacks on vehicular networks
    Lai, Yingxu
    Wei, Jingwen
    Chen, Ye
    COMPUTER NETWORKS, 2024, 255
  • [6] Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
    Usama, Muhammad
    Asim, Muhammad
    Latif, Siddique
    Qadir, Junaid
    Ala-Al-Fuqaha
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 78 - 83
  • [7] EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT
    Li, Shiming
    Wang, Jingxuan
    Wang, Yuhe
    Zhou, Guohui
    Zhao, Yan
    HELIYON, 2023, 9 (02)
  • [8] Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds
    Tang, Keke
    He, Xu
    Peng, Weilong
    Wu, Jianpeng
    Shi, Yawen
    Liu, Daizong
    Zhou, Pan
    Wang, Wenping
    Tian, Zhihong
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 6, 2024, : 5127 - 5135
  • [9] DETECTION OF ADVERSARIAL ATTACKS AND CHARACTERIZATION OF ADVERSARIAL SUBSPACE
    Esmaeilpour, Mohammad
    Cardinal, Patrick
    Koerich, Alessandro Lameiras
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 3097 - 3101
  • [10] Point Cloud Adversarial Perturbation Generation for Adversarial Attacks
    He, Fengmei
    Chen, Yihuai
    Chen, Ruidong
    Nie, Weizhi
    IEEE ACCESS, 2023, 11 : 2767 - 2774