XSS adversarial example attacks based on deep reinforcement learning

被引:6
|
作者
Chen, Li [1 ]
Tang, Cong [1 ]
He, Junjiang [1 ]
Zhao, Hui [1 ]
Lan, Xiaolong [1 ]
Li, Tao [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Web security; Cross site scripting; Adversarial examples; Adversarial attack; SAC; Reinforcement learning;
D O I
10.1016/j.cose.2022.102831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cross-site scripting (XSS) attack is one of the most serious security problems in web applications. Although deep neural network (DNN) has been used in XSS attack detection and achieved unprecedented success, it is vulnerable to adversarial example attacks because its input-output mapping is quite discontinuous to a large extent. The existence of adversarial examples have raised concerns in applying deep learning to key security fields. Therefore, to evaluate the effectiveness of these detection methods, a XSS adversarial example attack technique using Soft Actor-Critic (SAC) reinforcement learning algorithm is presented in the paper. A key aspect of our idea is to train an agent using SAC algorithm to build adversarial examples for several popular XSS detection models which have been proved can achieve very high accuracy rate by simulation experiments. We first design mutation strategies for different modules of XSS attack vectors to ensure the validity of the generated adversarial examples. Then, the agent selects an appropriate escape strategy according to the feedback of the detection model until it bypasses the detection model. The final experiment results show that our model can achieve an escape rate of more than 92% and outperforms the latest method by up to 6%. In other words, the effectiveness of these detection models needs to be improved, at least in terms of defense adversarial example attacks. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning
    Akers, Matthew
    Barton, Armon
    [J]. COMPUTER, 2024, 57 (01) : 88 - 99
  • [2] RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning
    Fang, Yong
    Huang, Cheng
    Xu, Yijia
    Li, Yang
    [J]. FUTURE INTERNET, 2019, 11 (08)
  • [3] Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler
    Zhang, Shaojun
    Wang, Chen
    Zomaya, Albert Y.
    [J]. 2020 IEEE 28TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2020), 2020, : 1 - 8
  • [4] Understanding adversarial attacks on observations in deep reinforcement learning
    You, Qiaoben
    Ying, Chengyang
    Zhou, Xinning
    Su, Hang
    Zhu, Jun
    Zhang, Bo
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (05)
  • [5] Understanding adversarial attacks on observations in deep reinforcement learning
    You QIAOBEN
    Chengyang YING
    Xinning ZHOU
    Hang SU
    Jun ZHU
    Bo ZHANG
    [J]. Science China(Information Sciences), 2024, 67 (05) : 69 - 83
  • [6] Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning
    Ilahi, Inaam
    Usama, Muhammad
    Qadir, Junaid
    Janjua, Muhammad Umar
    Al-Fuqaha, Ala
    Hoang, Dinh Thai
    Niyato, Dusit
    [J]. IEEE Transactions on Artificial Intelligence, 2022, 3 (02): : 90 - 109
  • [7] A Survey on Adversarial Attacks and Defenses for Deep Reinforcement Learning
    Liu, Ai-Shan
    Guo, Jun
    Li, Si-Min
    Xiao, Yi-Song
    Liu, Xiang-Long
    Tao, Da-Cheng
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (08): : 1553 - 1576
  • [8] Adversarial attacks on cooperative multi-agent deep reinforcement learning: a dynamic group-based adversarial example transferability method
    Lixia Zan
    Xiangbin Zhu
    Zhao-Long Hu
    [J]. Complex & Intelligent Systems, 2023, 9 : 7439 - 7450
  • [9] Adversarial attacks on cooperative multi-agent deep reinforcement learning: a dynamic group-based adversarial example transferability method
    Zan, Lixia
    Zhu, Xiangbin
    Hu, Zhao-Long
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (06) : 7439 - 7450
  • [10] Adversarial Jamming Attacks on Deep Reinforcement Learning Based Dynamic Multichannel Access
    Zhong, Chen
    Wang, Feng
    Gursoy, M. Cenk
    Velipasalar, Senem
    [J]. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2020,