Zero-Day Evasion Attack Analysis on Race between Attack and Defense

被引:1
|
作者
Kwon, Hyun [1 ]
Yoon, Hyunsoo [1 ]
Choi, Daeseon [2 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon, South Korea
[2] Kongju Natl Univ, Dept Med Informat, Gongju Si, South Korea
基金
新加坡国家研究基金会;
关键词
Deep neural network (DNN); Zero-day adversarial examples; Adversarial example; Adversarial training;
D O I
10.1145/3196494.3201583
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deep neural networks (DNNs) exhibit excellent performance in machine learning tasks such as image recognition, pattern recognition, speech recognition, and intrusion detection. However, the usage of adversarial examples, which are intentionally corrupted by noise, can lead to misclassification. As adversarial examples are serious threats to DNNs, both adversarial attacks and methods of defending against adversarial examples have been continuously studied. Zero-day adversarial examples are created with new test data and are unknown to the classifier; hence, they represent a more significant threat to DNNs. To the best of our knowledge, there are no analytical studies in the literature of zero-day adversarial examples with a focus on attack and defense methods through experiments using several scenarios. Therefore, in this study, zero-day adversarial examples are practically analyzed with an emphasis on attack and defense methods through experiments using various scenarios composed of a fixed target model and an adaptive target model. The Carlini method was used for a state-of-the-art attack, while an adversarial training method was used as a typical defense method. We used the MNIST dataset and analyzed success rates of zero-day adversarial examples, average distortions, and recognition of original samples through several scenarios of fixed and adaptive target models. Experimental results demonstrate that changing the parameters of the target model in real time leads to resistance to adversarial examples in both the fixed and adaptive target models.
引用
收藏
页码:805 / 807
页数:3
相关论文
共 50 条
  • [21] An Architecture of Unknown Attack Detection System against Zero-day Worm
    Kim, Ikkyun
    Kim, Daewon
    Kim, Byoungkoo
    Choi, Yangseo
    Yoon, Seongyong
    Oh, Jintae
    Jang, Jongsoo
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, : 205 - +
  • [22] Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection
    Hindy, Hanan
    Atkinson, Robert
    Tachtatzis, Christos
    Colin, Jean-Noel
    Bayne, Ethan
    Bellekens, Xavier
    ELECTRONICS, 2020, 9 (10) : 1 - 16
  • [23] Zero-day Attack Identification in Streaming data using Semantics and Spark
    Pallaprolu, Sai C.
    Sankineni, Rishi
    Thevar, Muthukumar
    Karabatis, George
    Wang, Jianwu
    2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017, : 121 - 128
  • [24] An Attack Graph Based Procedure for Risk Estimation of Zero-Day Attacks
    Keramati, Marjan
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 723 - 728
  • [25] Deep transductive transfer learning framework for zero-day attack detection
    Sameera, Nerella
    Shashi, M.
    ICT EXPRESS, 2020, 6 (04): : 361 - 367
  • [26] A robust intelligent zero-day cyber-attack detection technique
    Kumar, Vikash
    Sinha, Ditipriya
    COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (05) : 2211 - 2234
  • [27] Hybrid System to Minimize Damage by Zero-Day Attack based on NIDPS and HoneyPot
    Jeong, Jang Hyeon
    Choi, Seong Gon
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1650 - 1652
  • [28] Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game
    Sun, Yanwei
    Yin, Lihua
    Guo, Yunchuan
    Li, Fenghua
    Fang, Binxing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 313 - 327
  • [29] Toward Zero-day Attack Identification Using Linear Data Transformation Techniques
    AlEroud, Ahmed
    Karabatis, George
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, : 159 - 168
  • [30] Towards Detection of Zero-Day Botnet Attack in IoT Networks using Federated Learning
    Zhang, Jielun
    Liang, Shicong
    Ye, Feng
    Hu, Rose Qingyang
    Qian, Yi
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 7 - 12