Generate qualified adversarial attacks and foster enhanced models based on generative adversarial networks

被引:1
|
作者
He, Junpeng [1 ]
Luo, Lei [1 ]
Xiao, Kun [1 ]
Fang, Xiyu [1 ,2 ]
Li, Yun [1 ,3 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
[2] CATARC Automot Test Ctr Tianjin Co Ltd, Tianjin, Peoples R China
[3] Chengdu Weichen Informat Technol Co Ltd, Chengdu, Sichuan, Peoples R China
关键词
Adversarial attacks; deep learning (DL); generative adversarial networks (GAN); intrusion detection system (IDS); machine learning (ML);
D O I
10.3233/IDA-216134
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In cybersecurity, intrusion detection systems (IDSes) are of vital importance, allowing different companies and their departments to identify malicious attacks from magnanimous network traffic; however, the effectiveness and stability of these artificial intelligence-based systems are challenged when coping with adversarial attacks. This work explores a creative framework based on a generative adversarial network (GAN) with a series of training algorithms that aims to generate instances of adversarial attacks and utilize them to help establish a new IDS based on a neural network that can replace the old IDS without knowledge of any of its parameters. Furthermore, to verify the quality of the generated attacks, a transfer mechanism is proposed for calculating the Frechet inception distance (FID). Experiments show that based on the original CICIDS2017 dataset, the proposed framework can generate four types of adversarial attacks (DDoS, DoS, Bruteforce, and Infiltration), which precipitate four types of classifiers (Decision Tree, Random Forest, Adaboost, and Deep Neural Network), set as black-box old IDSes, with low detection rates; additionally, the IDSes that the proposed framework newly establish have an average detection rate of 98% in coping with both generated adversarial and original attacks.
引用
收藏
页码:1359 / 1377
页数:19
相关论文
共 50 条
  • [1] Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks
    Zhang, Xueqin
    Zhou, Yue
    Pei, Songwen
    Zhuge, Jingjing
    Chen, Jiahao
    IEEE ACCESS, 2020, 8 (08): : 10989 - 10996
  • [2] Cyber Attacks Detection Based on Generative Adversarial Networks
    Shi, Aining
    2021 2ND ASIA CONFERENCE ON COMPUTERS AND COMMUNICATIONS (ACCC 2021), 2021, : 111 - 114
  • [3] Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks
    Hu, Hailong
    Pang, Jun
    37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 1 - 16
  • [4] Enhanced Evolutionary Generative Adversarial Networks
    Mu, Jinzhen
    Zhou, Yan
    Cao, Shuqing
    Zhang, Yu
    Liu, Zongming
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7534 - 7539
  • [5] Detection of Adversarial DDoS Attacks Using Generative Adversarial Networks with Dual Discriminators
    Shieh, Chin-Shiuh
    Nguyen, Thanh-Tuan
    Lin, Wan-Wei
    Huang, Yong-Lin
    Horng, Mong-Fong
    Lee, Tsair-Fwu
    Miu, Denis
    SYMMETRY-BASEL, 2022, 14 (01):
  • [6] Using Generative Adversarial Networks to Generate Ultrasonic Signals
    Virupakshappa, Kushal
    Oruklu, Erdal
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL ULTRASONICS SYMPOSIUM (IUS), 2020,
  • [7] Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks
    Shieh, Chin-Shiuh
    Thanh-Tuan Nguyen
    Lin, Wan-Wei
    Lai, Wei Kuang
    Horng, Mong-Fong
    Miu, Denis
    ELECTRONICS, 2022, 11 (13)
  • [8] Attacking Frequency Information with Enhanced Adversarial Networks to Generate Adversarial Samples
    Ding, Jue
    Yin, Jun
    Dun, Jingyu
    Zhang, Wanwan
    Wang, Yayun
    ADVANCES IN VISUAL COMPUTING, ISVC 2022, PT I, 2022, 13598 : 61 - 73
  • [9] LP-GAN: Learning perturbations based on generative adversarial networks for point cloud adversarial attacks
    Liang, Qi
    Li, Qiang
    Yang, Song
    IMAGE AND VISION COMPUTING, 2022, 120
  • [10] Generative Adversarial Networks for Synthetic Jamming Attacks on UAVs
    Sarikaya, Burcu Sönmez
    Bahtiyar, Şerif
    UBMK 2024 - Proceedings: 9th International Conference on Computer Science and Engineering, 2024, : 760 - 765