SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection

被引:12
|
作者
Vitorino, Joao [1 ]
Praca, Isabel [1 ]
Maia, Eva [1 ]
机构
[1] Polytech Porto ISEP IPP, Sch Engn, Res Grp Intelligent Engn & Comp Adv Innovat & Dev, P-4249015 Porto, Portugal
关键词
Realistic adversarial examples; Adversarial robustness; Cybersecurity; Intrusion detection; Machine learning; ROBUSTNESS; SYSTEMS;
D O I
10.1016/j.cose.2023.103433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) can be incredibly valuable to automate anomaly detection and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is performed. However, despite the benefits of ML models, they are highly susceptible to adversarial cyber-attack examples specifically crafted to exploit them. A wide range of adversarial attacks have been created and researchers have worked on various defense strategies to safeguard ML models, but most were not intended for the specific constraints of a communication network and its communication protocols, so they may lead to unrealistic examples in the NID domain. This Systematization of Knowledge (SoK) consolidates and summarizes the state-of-the-art adversarial learning approaches that can generate realistic examples and could be used in ML development and deployment scenarios with real network traffic flows. This SoK also describes the open challenges regarding the use of adversarial ML in the NID domain, defines the fundamental properties that are required for an adversarial example to be realistic, and provides guidelines for researchers to ensure that their experiments are adequate for a real communication network.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses
    Rathore, Hemant
    Samavedhi, Adithya
    Sahay, Sanjay K.
    Sewak, Mohit
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 37
  • [32] A survey on adversarial attacks and defenses for object detection and their applications in autonomous vehicles
    Amirkhani, Abdollah
    Karimi, Mohammad Parsa
    Banitalebi-Dehkordi, Amin
    VISUAL COMPUTER, 2023, 39 (11): : 5293 - 5307
  • [33] A survey on adversarial attacks and defenses for object detection and their applications in autonomous vehicles
    Abdollah Amirkhani
    Mohammad Parsa Karimi
    Amin Banitalebi-Dehkordi
    The Visual Computer, 2023, 39 : 5293 - 5307
  • [34] On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks
    Choi, Jeongseok
    Kim, Hyoungshick
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 39 - 50
  • [35] Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System
    Zhou, Xiaokang
    Liang, Wei
    Li, Weimin
    Yan, Ke
    Shimizu, Shohei
    Wang, Kevin I-Kai
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9310 - 9319
  • [36] Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier
    Kulikov, D. A.
    Platonov, V. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1080 - 1086
  • [37] Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier
    D. A. Kulikov
    V. V. Platonov
    Automatic Control and Computer Sciences, 2021, 55 : 1080 - 1086
  • [38] Domain Adversarial Neural Network-Based Intrusion Detection System for In-Vehicle Network Variant Attacks
    Wei, Jingwen
    Chen, Ye
    Lai, Yingxu
    Wang, Yuhang
    Zhang, Zhaoyi
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (11) : 2547 - 2551
  • [39] Adversarial examples for network intrusion detection systems
    Sheatsley, Ryan
    Papernot, Nicolas
    Weisman, Michael J.
    Verma, Gunjan
    McDaniel, Patrick
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (05) : 727 - 752
  • [40] A Recombination Generative Adversarial Network for Intrusion Detection
    Luo, Haoqi
    Wan, Liang
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2024, 34 (02) : 323 - 334