Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection

被引:0
|
作者
Catillo, Marta [1 ]
Pecchia, Antonio [1 ]
Repola, Antonio [1 ]
Villano, Umberto [1 ]
机构
[1] Univ Sannio, Benevento, Italy
关键词
intrusion detection; machine learning; adversarial examples; supervised learning; Denial of Service; DETECTION SYSTEMS; ROBUSTNESS;
D O I
10.1145/3664476.3669974
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current trends in network intrusion detection systems (NIDS) capitalize on the extraction of features from network traffic and the use of up-to-date machine and deep learning techniques to infer a detection model; in consequence, NIDS can be vulnerable to adversarial attacks. Differently from the plethora of contributions that apply (and misuse) feature-level attacks envisioned in application domains far from NIDS, this paper proposes a novel approach to adversarial attacks, which consists in a realistic problem-space perturbation of the network traffic. The perturbation is achieved through a traffic control utility. Experiments are based on normal and Denial of Service traffic in both legitimate and adversarial conditions, and the application of four popular techniques to learn the NIDS models. The results highlight the transferability of the adversarial examples generated by the proposed problem-space attack as well as the effectiveness at inducing traffic misclassifications across the NIDS models obtained.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
    Debicha, Islam
    Bauwens, Richard
    Debatty, Thibault
    Dricot, Jean -Michel
    Kenaza, Tayeb
    Mees, Wim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 185 - 197
  • [32] Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning
    Li, Yunhao
    Mo, Weichuan
    Li, Cong
    Wang, Haiyang
    He, Jianwei
    Hao, Shanshan
    Yan, Hongyang
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 51 - 65
  • [33] Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks
    Merzouk, Mohamed Amine
    Delas, Josephine
    Neal, Christopher
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [34] Verifying the Robustness of Machine Learning based Intrusion Detection Against Adversarial Perturbation
    Nowroozi, Ehsan
    Taheri, Rahim
    Hajizadeh, Mehrdad
    Bauschert, Thomas
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 9 - 15
  • [35] On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks
    Choi, Jeongseok
    Kim, Hyoungshick
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 39 - 50
  • [36] Approach to Detecting Attacks against Machine Learning Systems with a Generative Adversarial Network
    Kotenko, I. V.
    Saenko, I. B.
    Lauta, O. S.
    Vasilev, N. A.
    Sadovnikov, V. E.
    PATTERN RECOGNITION AND IMAGE ANALYSIS, 2024, 34 (03) : 589 - 596
  • [37] Detection of adversarial attacks on machine learning systems
    Judah, Matthew
    Sierchio, Jen
    Planer, Michael
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [38] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 763 - 775
  • [39] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Mohamed Amine Merzouk
    Frédéric Cuppens
    Nora Boulahia-Cuppens
    Reda Yaich
    Annals of Telecommunications, 2022, 77 : 763 - 775
  • [40] Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems
    P. E. Yugai
    D. A. Moskvin
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1226 - 1233