Automatically evading IDS using GP authored attacks

被引:8
|
作者
Kayacik, H. Guenes [1 ]
Zincir-Heywood, A. Nur [1 ]
Heywood, Malcolm I. [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, 6050 Univ Ave, Halifax, NS B3H 1W5, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/CISDA.2007.368148
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A mimicry attack is a type of attack where the basic steps of a minimalist 'core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we provide a genetic programming based automated process for designing all components of a mimicry attack relative to the Stide detector under a vulnerable Traceroute application. Results indicate that the automatic process is able to generate mimicry attacks that reduce the alarm rate from similar to 65% of the original attack, to similar to 2.7%, effectively making the attack indistinguishable from normal behaviors.
引用
收藏
页码:153 / +
页数:3
相关论文
共 50 条
  • [41] Defending OC-SVM based IDS from poisoning attacks
    Zhang, Lu
    Cushing, Reginald
    Grosso, Paola
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [42] Hardware/Software Mechanisms for Protecting an IDS Against Algorithmic Complexity Attacks
    Sreekar Shenoy, Govind
    Tubella, Jordi
    Gonzalez, Antonio
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1190 - 1196
  • [43] A Semisupervised Majority Weighted Vote Antiphishing Attacks IDS for the Education Industry
    Yin, Xiaona
    Zheng, Xingxing
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [44] A New IDS for Detecting DDoS Attacks in Wireless Networks using Spotted Hyena Optimization and Fuzzy Temporal CNN
    Nalayini, C. M.
    Katiravan, Jeevaa
    JOURNAL OF INTERNET TECHNOLOGY, 2023, 24 (01): : 23 - 34
  • [45] EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT
    Li, Shiming
    Wang, Jingxuan
    Wang, Yuhe
    Zhou, Guohui
    Zhao, Yan
    HELIYON, 2023, 9 (02)
  • [46] Link Analysis Approach to Improve Detection of Fragmentation Attacks in Misuse IDS
    Ben Ahmed, Olfa
    Choukair, Zied
    2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING (COMNET 2009), 2009, : 117 - 124
  • [47] An AI Based IDS Framework For Detecting DDoS Attacks In Cloud Environment
    Varma, S. Asha
    Reddy, K. Ganesh
    INFORMATION SECURITY JOURNAL, 2024, 33 (06): : 613 - 625
  • [48] Topology Adaptive Computation of Distributed IDS Set for Detecting Attacks on STP
    Chakraborty, Suchetana
    Barbhuiya, Ferdous A.
    Rai, Ankush
    Sur, Arijit
    Biswas, Santosh
    Nandi, Sukumar
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (05): : 284 - 295
  • [49] Adversarial Attacks on SDN-Based Deep Learning IDS System
    Huang, Chi-Hsuan
    Lee, Tsung-Han
    Chang, Lin-Huang
    Lin, Jhih-Ren
    Horng, Gwoboa
    MOBILE AND WIRELESS TECHNOLOGY 2018, ICMWT 2018, 2019, 513 : 181 - 191
  • [50] Automatically Traceback RDP-Based Targeted Ransomware Attacks
    Wang, ZiHan
    Liu, ChaoGe
    Qiu, Jing
    Tian, ZhiHong
    Cui, Xiang
    Su, Shen
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,