Zero-Day Evasion Attack Analysis on Race between Attack and Defense

被引:1
|
作者
Kwon, Hyun [1 ]
Yoon, Hyunsoo [1 ]
Choi, Daeseon [2 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon, South Korea
[2] Kongju Natl Univ, Dept Med Informat, Gongju Si, South Korea
基金
新加坡国家研究基金会;
关键词
Deep neural network (DNN); Zero-day adversarial examples; Adversarial example; Adversarial training;
D O I
10.1145/3196494.3201583
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deep neural networks (DNNs) exhibit excellent performance in machine learning tasks such as image recognition, pattern recognition, speech recognition, and intrusion detection. However, the usage of adversarial examples, which are intentionally corrupted by noise, can lead to misclassification. As adversarial examples are serious threats to DNNs, both adversarial attacks and methods of defending against adversarial examples have been continuously studied. Zero-day adversarial examples are created with new test data and are unknown to the classifier; hence, they represent a more significant threat to DNNs. To the best of our knowledge, there are no analytical studies in the literature of zero-day adversarial examples with a focus on attack and defense methods through experiments using several scenarios. Therefore, in this study, zero-day adversarial examples are practically analyzed with an emphasis on attack and defense methods through experiments using various scenarios composed of a fixed target model and an adaptive target model. The Carlini method was used for a state-of-the-art attack, while an adversarial training method was used as a typical defense method. We used the MNIST dataset and analyzed success rates of zero-day adversarial examples, average distortions, and recognition of original samples through several scenarios of fixed and adaptive target models. Experimental results demonstrate that changing the parameters of the target model in real time leads to resistance to adversarial examples in both the fixed and adaptive target models.
引用
收藏
页码:805 / 807
页数:3
相关论文
共 50 条
  • [1] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 200 - 204
  • [2] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 200 - 204
  • [3] A Zero-Day Cloud Timing Channel Attack
    Flowers, Robert
    IEEE ACCESS, 2022, 10 : 128177 - 128186
  • [4] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557
  • [5] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811
  • [6] Towards Probabilistic Identification of Zero-day Attack Paths
    Sun, Xiaoyan
    Dai, Jun
    Liu, Peng
    Singhal, Anoop
    Yen, John
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 64 - 72
  • [7] Decision Support System for Zero-day Attack Response
    Kim, Huy Kang
    Kim, Soo-Kyun
    Kim, Seok-Hun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 : 221 - 241
  • [8] Zero-day attack detection: a systematic literature review
    Rasheed Ahmad
    Izzat Alsmadi
    Wasim Alhamdani
    Lo’ai Tawalbeh
    Artificial Intelligence Review, 2023, 56 : 10733 - 10811
  • [9] Social Media Zero-Day Attack Detection Using TensorFlow
    Topcu, Ahmet Ercan
    Alzoubi, Yehia Ibrahim
    Elbasi, Ersin
    Camalan, Emre
    ELECTRONICS, 2023, 12 (17)
  • [10] Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits
    Hausken, Kjell
    Welburn, Jonathan W.
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (06) : 1609 - 1620