Triggerability of Backdoor Attacks in Multi-Source Transfer Learning-based Intrusion Detection

被引:2
|
作者
Alhussien, Nour [1 ]
Aleroud, Ahmed [1 ]
Rahaeimehr, Reza [1 ]
Schwarzmann, Alexander [1 ]
机构
[1] Augusta Univ, Sch Comp & Cyber Sci, Augusta, GA 30912 USA
基金
美国国家科学基金会;
关键词
Intrusion detection; transfer learning; backdoor attacks; poisoning attacks; distributed systems; TAXONOMY; SYSTEM;
D O I
10.1109/BDCAT56447.2022.00013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network-based Intrusion Detection Systems (NIDSs) automate monitoring of events in networks and analyze them for signatures of cyberattacks. With the advancement of machine learning algorithms, more organizations started using machine learning based IDSs (ML-IDSs) to identify and mitigate cyberattacks. However, the lack of training datasets is a major challenge when implementing ML-IDSs. Therefore, using training data from external sources or transfer learning models are some solutions to overcome this challenge. However, using training data from external sources introduces the risk of backdoored datasets, specifically, when the adversaries also have background knowledge on data sources inside the target organization. This work investigates the role of backdoor attacks on intrusion detection techniques trained using multi-source data. The backdoor examples are injected into one or more training data sources. Transfer learning models are then created by projecting data from different sources into a new subspace containing all source data. The backdoor is then triggered in the target data. An anomaly-based intrusion detection classifier is applied to examine the effectiveness of the introduced backdoors. The results have shown that backdoor attacks on multissource transfer learning models are feasible, although having less impact compared to backdoors on traditional machine learning models.
引用
收藏
页码:40 / 47
页数:8
相关论文
共 50 条
  • [1] TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
    Debicha, Islam
    Bauwens, Richard
    Debatty, Thibault
    Dricot, Jean -Michel
    Kenaza, Tayeb
    Mees, Wim
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 185 - 197
  • [2] Backdoor Attacks on Multi-Agent Reinforcement Learning-based Spectrum Management
    Zhang, Hongyi
    Liu, Mingqian
    Chen, Yunfei
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3361 - 3365
  • [3] Parameterizing poisoning attacks in federated learning-based intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [4] A multi-source transfer learning-based weighted network for small sample defect inspection
    Hong, Yue
    Li, Chen
    Yan, Haoxin
    Valle, Erik
    Dou, Yi
    Liao, Chengwei
    Zhu, Peiyuan
    Zhu, Shidong
    Li, Xiu
    Qian, Xiang
    Wang, Xiaohao
    Li, Xinghui
    [J]. OPTOELECTRONIC IMAGING AND MULTIMEDIA TECHNOLOGY IX, 2022, 12317
  • [5] Multi-Source Cyber-Attacks Detection using Machine Learning
    Taheri, Sona
    Gondal, Iqbal
    Bagirov, Adil
    Harkness, Greg
    Brown, Simon
    Chi, CHihung
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1167 - 1172
  • [6] A deep learning-based framework for multi-source precipitation fusion
    Gavahi, Keyhan
    Foroumandi, Ehsan
    Moradkhani, Hamid
    [J]. REMOTE SENSING OF ENVIRONMENT, 2023, 295
  • [7] Active poisoning: efficient backdoor attacks on transfer learning-based brain-computer interfaces
    Xue Jiang
    Lubin Meng
    Siyang Li
    Dongrui Wu
    [J]. Science China Information Sciences, 2023, 66
  • [8] Active poisoning: efficient backdoor attacks on transfer learning-based brain-computer interfaces
    Jiang, Xue
    Meng, Lubin
    Li, Siyang
    Wu, Dongrui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (08)
  • [9] Active poisoning: efficient backdoor attacks on transfer learning-based brain-computer interfaces
    Xue JIANG
    Lubin MENG
    Siyang LI
    Dongrui WU
    [J]. Science China(Information Sciences), 2023, 66 (08) : 211 - 232
  • [10] A machine learning-based intrusion detection for detecting internet of things network attacks
    Saheed, Yakub Kayode
    Abiodun, Aremu Idris
    Misra, Sanjay
    Holone, Monica Kristiansen
    Colomo-Palacios, Ricardo
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 9395 - 9409