Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms

被引:46
|
作者
Zhang, Chaoyun [1 ,2 ]
Costa-Perez, Xavier [3 ,4 ,5 ]
Patras, Paul [1 ,6 ]
机构
[1] Univ Edinburgh, Sch Informat, Edinburgh EH8 9AB, Midlothian, Scotland
[2] Tencent Lightspeed & Quantum Studios, Shenzhen 518057, Peoples R China
[3] I2CAT Fdn, Barcelona 08034, Spain
[4] ICREA, Barcelona 08010, Spain
[5] NEC Labs Europe, D-69115 Heidelberg, Germany
[6] Net AI, Edinburgh EH3 8HA, Midlothian, Scotland
关键词
Feature extraction; Deep learning; Robustness; Perturbation methods; Network intrusion detection; Detectors; Training; Adversarial attacks; network intrusion detection systems; deep learning;
D O I
10.1109/TNET.2021.3137084
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Neural networks (NNs) are increasingly popular in developing NIDS, yet can prove vulnerable to adversarial examples. Through these, attackers that may be oblivious to the precise mechanics of the targeted NIDS add subtle perturbations to malicious traffic features, with the aim of evading detection and disrupting critical systems. Defending against such adversarial attacks is of high importance, but requires to address daunting challenges. Here, we introduce TIKI-TAKA, a general framework for (i) assessing the robustness of state-of-the-art deep learning-based NIDS against adversarial manipulations, and which (ii) incorporates defense mechanisms that we propose to increase resistance to attacks employing such evasion techniques. Specifically, we select five cutting-edge adversarial attack types to subvert three popular malicious traffic detectors that employ NNs. We experiment with publicly available datasets and consider both one-to-all and one-to-one classification scenarios, i.e., discriminating illicit vs benign traffic and respectively identifying specific types of anomalous traffic among many observed. The results obtained reveal that attackers can evade NIDS with up to 35.7% success rates, by only altering time-based features of the traffic generated. To counteract these weaknesses, we propose three defense mechanisms: model voting ensembling, ensembling adversarial training, and query detection. We demonstrate that these methods can restore intrusion detection rates to nearly 100% against most types of malicious traffic, and attacks with potentially catastrophic consequences (e.g., botnet) can be thwarted. This confirms the effectiveness of our solutions and makes the case for their adoption when designing robust and reliable deep anomaly detectors.
引用
收藏
页码:1294 / 1311
页数:18
相关论文
共 50 条
  • [1] Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection
    Wang, Jianyu
    Pan, Jianli
    AlQerm, Ismail
    Liu, Yuanni
    [J]. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [2] Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System
    Nguyen, Xuan-Ha
    Nguyen, Xuan-Duong
    Le, Kim-Hung
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 382 - 396
  • [3] Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems
    Haroon, Muhammad Shahzad
    Ali, Husnain Mansoor
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 3513 - 3527
  • [4] Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks
    Merzouk, Mohamed Amine
    Delas, Josephine
    Neal, Christopher
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [5] ENSEMBLE ADVERSARIAL TRAINING BASED DEFENSE AGAINST ADVERSARIAL ATTACKS FOR MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEM
    Haroon, M. S.
    Ali, H. M.
    [J]. NEURAL NETWORK WORLD, 2023, 33 (05) : 317 - 336
  • [6] TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
    Debicha, Islam
    Bauwens, Richard
    Debatty, Thibault
    Dricot, Jean -Michel
    Kenaza, Tayeb
    Mees, Wim
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 185 - 197
  • [7] Adversarial attacks against supervised machine learning based network intrusion detection systems
    Alshahrani, Ebtihaj
    Alghazzawi, Daniyal
    Alotaibi, Reem
    Rabie, Osama
    [J]. PLOS ONE, 2022, 17 (10):
  • [8] Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems
    Yang, Kaichen
    Liu, Jianqing
    Zhang, Chi
    Fang, Yuguang
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 559 - 564
  • [9] Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
    Alotaibi, Afnan
    Rassam, Murad A.
    [J]. FUTURE INTERNET, 2023, 15 (02)
  • [10] Generating practical adversarial examples against learning-based network intrusion detection systems
    Kumar, Vivek
    Kumar, Kamal
    Singh, Maheep
    [J]. ANNALS OF TELECOMMUNICATIONS, 2024,