Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems

被引:13
|
作者
Debicha, Islam [1 ,2 ]
Cochez, Benjamin [1 ]
Kenaza, Tayeb [3 ]
Debatty, Thibault [2 ]
Dricot, Jean -Michel [1 ]
Mees, Wim [2 ]
机构
[1] Univ Libre Bruxelles, Cybersecur Res Ctr, B-1000 Brussels, Belgium
[2] Royal Mil Acad, Cyber Def Lab, B-1000 Brussels, Belgium
[3] Ecole Mil Polytech, Comp Secur Lab, Algiers, Algeria
关键词
Intrusion detection system; Botnet attacks; Machine learning; Evasion attacks; Adversarial detection; ROBUSTNESS;
D O I
10.1016/j.cose.2023.103176
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the numerous advantages of machine learning (ML) algorithms, many applications now incorpo-rate them. However, many studies in the field of image classification have shown that MLs can be fooled by a variety of adversarial attacks. These attacks take advantage of ML algorithms' inherent vulnerability. This raises many questions in the cybersecurity field, where a growing number of researchers are recently investigating the feasibility of such attacks against machine learning-based security systems, such as in-trusion detection systems. The majority of this research demonstrates that it is possible to fool a model using features extracted from a raw data source, but it does not take into account the real implemen-tation of such attacks, i.e., the reverse transformation from theory to practice. The real implementation of these adversarial attacks would be influenced by various constraints that would make their execution more difficult. As a result, the purpose of this study was to investigate the actual feasibility of adversarial attacks, specifically evasion attacks, against network-based intrusion detection systems (NIDS), demon-strating that it is entirely possible to fool these ML-based IDSs using our proposed adversarial algorithm while assuming as many constraints as possible in a black-box setting. In addition, since it is critical to design defense mechanisms to protect ML-based IDSs against such attacks, a defensive scheme is pre-sented. Realistic botnet traffic traces are used to assess this work. Our goal is to create adversarial botnet traffic that can avoid detection while still performing all of its intended malicious functionality.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Adversarial machine learning in Network Intrusion Detection Systems
    Alhajjar, Elie
    Maxwell, Paul
    Bastian, Nathaniel
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
  • [42] PANDA: Practical Adversarial Attack Against Network Intrusion Detection
    Swain, Subrat Kumar
    Kumar, Vireshwar
    Bai, Guangdong
    Kim, Dan Dongseong
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME, DSN-S 2024, 2024, : 28 - 32
  • [43] Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
    Ibitoye, Olakunle
    Shafiq, Omair
    Matrawy, Ashraf
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [44] A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks
    Alslman, Yasmeen
    Alkasassbeh, Mouhammd
    Almseidin, Mohammad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 4179 - 4195
  • [45] A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks
    Yasmeen Alslman
    Mouhammd Alkasassbeh
    Mohammad Almseidin
    Arabian Journal for Science and Engineering, 2024, 49 : 4179 - 4195
  • [46] Botnet detection based on generative adversarial network
    Zou, Futai
    Tan, Yue
    Wang, Lin
    Jiang, Yongkang
    Tongxin Xuebao/Journal on Communications, 2021, 42 (07): : 95 - 106
  • [47] On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks
    Dyrmishi, Salijona
    Ghamizi, Salah
    Simonetto, Thibault
    Le Traon, Yves
    Cordy, Maxime
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1384 - 1400
  • [48] Generating practical adversarial examples against learning-based network intrusion detection systems
    Kumar, Vivek
    Kumar, Kamal
    Singh, Maheep
    ANNALS OF TELECOMMUNICATIONS, 2025, 80 (3-4) : 209 - 226
  • [49] Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach
    Li, Xiping
    Dong, Wei
    Sun, Yi
    Chen, Shaolong
    Kong, Detong
    Yang, Shujie
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1364 - 1369
  • [50] Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems
    Zizzo, Giulio
    Hankin, Chris
    Maffeis, Sergio
    Jones, Kevin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 900 - 911