Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions

被引:7
|
作者
Zhang, Rongqian [1 ]
Luo, Senlin [1 ]
Pan, Limin [1 ]
Hao, Jingwei [1 ]
Zhang, Ji [1 ]
机构
[1] Beijing Inst Technol, Informat Syst & Secur & Countermeasures Expt Ctr, Beijing 100081, Peoples R China
关键词
Adversarial attack; Generate adversarial examples; Intrusion detection systems; Generative adversarial networks; Flow-based model;
D O I
10.1016/j.neucom.2021.12.015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Well-crafted adversarial examples can easily deceive neural network models into producing misclassified results while contributing to evaluating and improving the performance and robustness of the classification model. However, most adversarial examples generation methods still have the following drawbacks: (1) the original samples ignore the distribution regularity of benign samples and directly add noise, so the generated adversarial examples have significant differences in latent spatial distribution with benign samples, which makes them difficult to escape detection; (2) the discriminant features of the adversarial examples are directly modified, which causes their malicious patterns to change or malicious functions to be unattainable. In this paper, a novel malicious traffic adversarial examples generation method, NIDSFM, is proposed. Through NIDSFM, the feature space of the traffic samples is reconstructed to avoid interference with the malicious functions of the generated adversarial examples by isolating the discriminant features. By using the ability of the flow-based model to represent the latent space distribution, the distribution of adversarial examples is modeled around the benign samples, then fine-tuned based on generative adversarial networks (GAN) with additional latent spatial noise so that the distribution of generated adversarial examples is similar to benign samples. Extensive experiments were conducted on multiple datasets (NSL-KDD, UNSW-NB15, CIC-DDoS2019) and compared with various adversarial examples generation methods. The experimental results show that the proposed method leads to a significant reduction in the detection rate of multiple NIDSs and is competitive in escaping NIDS detection. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:413 / 430
页数:18
相关论文
共 5 条
  • [1] Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions
    Zhang, Rongqian
    Luo, Senlin
    Pan, Limin
    Hao, Jingwei
    Zhang, Ji
    Neurocomputing, 2022, 490 : 413 - 430
  • [2] Generating Semantic Adversarial Examples via Feature Manipulation in Latent Space
    Wang, Shuo
    Chen, Shangyu
    Chen, Tianle
    Nepal, Surya
    Rudolph, Carsten
    Grobler, Marthie
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (12) : 17070 - 17084
  • [3] Enhancing the Robustness via Adversarial Learning and Joint Spatial-Temporal Embeddings in Traffic Forecasting
    Jiang, Juyong
    Wu, Binqing
    Chen, Ling
    Zhang, Kai
    Kim, Sunghun
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 987 - 996
  • [4] Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features
    Yun, Xiaochun
    Xie, Jiang
    Li, Shuhao
    Zhang, Yongzheng
    Sun, Peishuai
    Computers and Security, 2022, 121
  • [5] Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features
    Yun, Xiaochun
    Xie, Jiang
    Li, Shuhao
    Zhang, Yongzheng
    Sun, Peishuai
    COMPUTERS & SECURITY, 2022, 121