Automatically evading IDS using GP authored attacks

被引:8
|
作者
Kayacik, H. Guenes [1 ]
Zincir-Heywood, A. Nur [1 ]
Heywood, Malcolm I. [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, 6050 Univ Ave, Halifax, NS B3H 1W5, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/CISDA.2007.368148
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A mimicry attack is a type of attack where the basic steps of a minimalist 'core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we provide a genetic programming based automated process for designing all components of a mimicry attack relative to the Stide detector under a vulnerable Traceroute application. Results indicate that the automatic process is able to generate mimicry attacks that reduce the alarm rate from similar to 65% of the original attack, to similar to 2.7%, effectively making the attack indistinguishable from normal behaviors.
引用
收藏
页码:153 / +
页数:3
相关论文
共 50 条
  • [21] Heterogeneous Fusion of IDS alerts for Detecting DOS Attacks
    Shah, Vrushank
    Aggarwal, A. K.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 153 - 158
  • [22] Unknown Attacks Detection Using Feature Extraction from Anomaly-based IDS Alerts
    Sato, Masaaki
    Yamaki, Hirofumi
    Takakura, Hiroki
    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 273 - 277
  • [23] L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks
    Mofidi, Farhad
    Hounsinou, Sena G.
    Bloom, Gedare
    PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, 2023, : 464 - 465
  • [24] PPFL-IDS: Privacy-Preserving Federated Learning Based IDS Against Poisoning Attacks
    Xu, Mengfan
    Li, Xinghua
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5): : 1514 - 1525
  • [25] Evading text based emotion detection mechanism via adversarial attacks
    Bajaj, Ashish
    Vishwakarma, Dinesh Kumar
    NEUROCOMPUTING, 2023, 558
  • [26] HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks
    Wu, Yi
    Xu, Xiangyu
    Walker, Payton
    Liu, Jian
    Saxena, Nitesh
    Chen, Yingying
    Yu, Jiadi
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 82 - 94
  • [27] Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
    Dong, Yinpeng
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 4307 - 4316
  • [28] IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks
    Xia, Zhuoqun
    Tan, Jingjing
    Gu, Ke
    Li, Xiong
    Jia, Weijia
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 995 - 1008
  • [29] Discovery of DoS attacks by the ZED-IDS anomaly detector
    Catillo, Marta
    Rak, Massimiliano
    Villano, Umberto
    JOURNAL OF HIGH SPEED NETWORKS, 2019, 25 (04) : 349 - 365
  • [30] An IDS Evaluation-Centric Taxonomy of Wireless Security Attacks
    Nasr, Khalid
    Abou El Kalam, Anas
    Fraboul, Christian
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 402 - 413