Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems

被引:13
|
作者
Debicha, Islam [1 ,2 ]
Cochez, Benjamin [1 ]
Kenaza, Tayeb [3 ]
Debatty, Thibault [2 ]
Dricot, Jean -Michel [1 ]
Mees, Wim [2 ]
机构
[1] Univ Libre Bruxelles, Cybersecur Res Ctr, B-1000 Brussels, Belgium
[2] Royal Mil Acad, Cyber Def Lab, B-1000 Brussels, Belgium
[3] Ecole Mil Polytech, Comp Secur Lab, Algiers, Algeria
关键词
Intrusion detection system; Botnet attacks; Machine learning; Evasion attacks; Adversarial detection; ROBUSTNESS;
D O I
10.1016/j.cose.2023.103176
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the numerous advantages of machine learning (ML) algorithms, many applications now incorpo-rate them. However, many studies in the field of image classification have shown that MLs can be fooled by a variety of adversarial attacks. These attacks take advantage of ML algorithms' inherent vulnerability. This raises many questions in the cybersecurity field, where a growing number of researchers are recently investigating the feasibility of such attacks against machine learning-based security systems, such as in-trusion detection systems. The majority of this research demonstrates that it is possible to fool a model using features extracted from a raw data source, but it does not take into account the real implemen-tation of such attacks, i.e., the reverse transformation from theory to practice. The real implementation of these adversarial attacks would be influenced by various constraints that would make their execution more difficult. As a result, the purpose of this study was to investigate the actual feasibility of adversarial attacks, specifically evasion attacks, against network-based intrusion detection systems (NIDS), demon-strating that it is entirely possible to fool these ML-based IDSs using our proposed adversarial algorithm while assuming as many constraints as possible in a black-box setting. In addition, since it is critical to design defense mechanisms to protect ML-based IDSs against such attacks, a defensive scheme is pre-sented. Realistic botnet traffic traces are used to assess this work. Our goal is to create adversarial botnet traffic that can avoid detection while still performing all of its intended malicious functionality.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
    Hashemi, Mohammad J.
    Keller, Eric
    2020 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2020, : 37 - 43
  • [22] TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
    Debicha, Islam
    Bauwens, Richard
    Debatty, Thibault
    Dricot, Jean -Michel
    Kenaza, Tayeb
    Mees, Wim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 185 - 197
  • [23] A Wasserstein GAN-based Framework for Adversarial Attacks against Intrusion Detection Systems
    Cui, Fangda
    Ye, Qiang
    Kibenge-MacLeod, Patricia
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3187 - 3192
  • [24] Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
    Alotaibi, Afnan
    Rassam, Murad A.
    FUTURE INTERNET, 2023, 15 (02)
  • [25] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 763 - 775
  • [26] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Mohamed Amine Merzouk
    Frédéric Cuppens
    Nora Boulahia-Cuppens
    Reda Yaich
    Annals of Telecommunications, 2022, 77 : 763 - 775
  • [27] Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors
    Apruzzese, Giovanni
    Colajanni, Michele
    Marchetti, Mirco
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 193 - 200
  • [28] Adversarial examples for network intrusion detection systems
    Sheatsley, Ryan
    Papernot, Nicolas
    Weisman, Michael J.
    Verma, Gunjan
    McDaniel, Patrick
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (05) : 727 - 752
  • [29] TXAI-ADV: Trustworthy XAI for Defending AI Models against Adversarial Attacks in Realistic CIoT
    Ojo, Stephen
    Krichen, Moez
    Alamro, Meznah A.
    Mihoub, Alaeddine
    ELECTRONICS, 2024, 13 (09)
  • [30] Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems
    Yang, Kaichen
    Liu, Jianqing
    Zhang, Chi
    Fang, Yuguang
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 559 - 564