Zero-Day Evasion Attack Analysis on Race between Attack and Defense

被引:1
|
作者
Kwon, Hyun [1 ]
Yoon, Hyunsoo [1 ]
Choi, Daeseon [2 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon, South Korea
[2] Kongju Natl Univ, Dept Med Informat, Gongju Si, South Korea
基金
新加坡国家研究基金会;
关键词
Deep neural network (DNN); Zero-day adversarial examples; Adversarial example; Adversarial training;
D O I
10.1145/3196494.3201583
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deep neural networks (DNNs) exhibit excellent performance in machine learning tasks such as image recognition, pattern recognition, speech recognition, and intrusion detection. However, the usage of adversarial examples, which are intentionally corrupted by noise, can lead to misclassification. As adversarial examples are serious threats to DNNs, both adversarial attacks and methods of defending against adversarial examples have been continuously studied. Zero-day adversarial examples are created with new test data and are unknown to the classifier; hence, they represent a more significant threat to DNNs. To the best of our knowledge, there are no analytical studies in the literature of zero-day adversarial examples with a focus on attack and defense methods through experiments using several scenarios. Therefore, in this study, zero-day adversarial examples are practically analyzed with an emphasis on attack and defense methods through experiments using various scenarios composed of a fixed target model and an adaptive target model. The Carlini method was used for a state-of-the-art attack, while an adversarial training method was used as a typical defense method. We used the MNIST dataset and analyzed success rates of zero-day adversarial examples, average distortions, and recognition of original samples through several scenarios of fixed and adaptive target models. Experimental results demonstrate that changing the parameters of the target model in real time leads to resistance to adversarial examples in both the fixed and adaptive target models.
引用
收藏
页码:805 / 807
页数:3
相关论文
共 50 条
  • [41] Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices
    Popoola, Segun, I
    Ande, Ruth
    Adebisi, Bamidele
    Gui, Guan
    Hammoudeh, Mohammad
    Jogunola, Olamide
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3930 - 3944
  • [42] On Detection and Prevention of Zero-Day Attack Using Cuckoo Sandbox in Software-Defined Networks
    Al-Rushdan, Huthifh
    Shurman, Mohammad
    Alnabelsi, Sharhabeel
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (4A) : 662 - 670
  • [43] Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier
    Umme Zahoora
    Muttukrishnan Rajarajan
    Zahoqing Pan
    Asifullah Khan
    Applied Intelligence, 2022, 52 : 13941 - 13960
  • [44] Network-based and attack-resilient length signature generation for zero-day polymorphic worms
    Li, Zhichun
    Wang, Lanjia
    Chen, Yan
    Judy Fu, Zhi
    2007 IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, 2007, : 164 - +
  • [45] Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier
    Zahoora, Umme
    Rajarajan, Muttukrishnan
    Pan, Zahoqing
    Khan, Asifullah
    APPLIED INTELLIGENCE, 2022, 52 (12) : 13941 - 13960
  • [46] INTEGRATING DEEP LEARNING WITH FIRST-ORDER LOGIC PROGRAMMED CONSTRAINTS FOR ZERO-DAY PHISHING ATTACK DETECTION
    Bu, Seok-Jun
    Cho, Sung-Bae
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2685 - 2689
  • [47] PARASITE DEFENSE-MECHANISMS FOR EVASION OF HOST ATTACK - A REVIEW
    LEID, RW
    SUQUET, CM
    TANIGOSHI, L
    VETERINARY PARASITOLOGY, 1987, 25 (02) : 147 - 162
  • [48] RETRACTION: Hybrid Layered Architecture for Detection and Analysis of Network Based Zero-day Attack (Retraction of Vol 106, Pg 100, 2017)
    Singh, Saurabh
    Sharma, Pradip Kumar
    Moon, Seo Yeon
    Park, Jong Hyuk
    COMPUTER COMMUNICATIONS, 2019, 134 : 185 - 185
  • [49] Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV
    Korba, Abdelaziz Amara
    Boualouache, Abdelwahab
    Ghamri-Doudane, Yacine
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 12399 - 12414
  • [50] Hue Signature Auto Update System for Visual Similarity-Based Phishing Detection with Tolerance to Zero-Day Attack
    Haruta, Shuichiro
    Asahina, Hiromu
    Yamazaki, Fumitaka
    Sasase, Iwao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (12) : 2461 - 2471