Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system

被引:28
作者
Roshan, Khushnaseeb [1 ]
Zafar, Aasim [1 ]
Ul Haque, Shiekh Burhan [1 ]
机构
[1] Aligarh Muslim Univ Cent Uni, Dept Comp Sci, Aligarh 202002, India
关键词
Network intrusion detection; Deep neural network; Adversarial machine learning; Adversarial attack; Adversarial defence; SECURITY;
D O I
10.1016/j.comcom.2023.09.030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection System (NIDS) is a key component in securing the computer network from various cyber security threats and network attacks. However, consider an unfortunate situation where the NIDS is itself attacked and vulnerable; more specifically, we can ask, "How to defend the defender?". In Adversarial Machine Learning (AML), the malicious actors aim to fool the Machine Learning (ML) and Deep Learning (DL) models to produce incorrect predictions with intentionally crafted adversarial examples. These adversarial perturbed examples have become the biggest vulnerability of ML and DL based systems and are major obstacles to their adoption in real-time and mission-critical applications such as NIDS. AML is an emerging research domain, and it has become a necessity for the in-depth study of adversarial attacks and their defence strategies to safeguard the computer network from various cyber security threads. In this research work, we aim to cover important aspects related to NIDS, adversarial attacks and its defence mechanism to increase the robustness of the ML and DL based NIDS. We implemented four powerful adversarial attack techniques, namely, Fast Gradient Sign Method (FGSM), Jacobian Saliency Map Attack (JSMA), Projected Gradient Descent (PGD) and Carlini & Wagner (C&W) in NIDS. We analyzed its performance in terms of various performance metrics in detail. Furthermore, the three heuristics defence strategies, i.e., Adversarial Training (AT), Gaussian Data Augmentation (GDA) and High Confidence (HC), are implemented to improve the NIDS robustness under adversarial attack situations. The complete workflow is demonstrated in real-time network with data packet flow. This research work provides the overall background for the researchers interested in AML and its implementation from a computer network security point of view.
引用
收藏
页码:97 / 113
页数:17
相关论文
共 49 条
[31]   Deep Learning Based IoT System for Real-time Traffic Risk Notifications [J].
Islam, Sahidul ;
Klupka, Seth ;
Mohammadi, Ramin ;
Jin, Yu-Fang ;
Xie, Mimi .
2024 25TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED 2024, 2024,
[32]   SecFedNIDS: Robust defense for poisoning attack against federated learning-based network intrusion detection system [J].
Zhang, Zhao ;
Zhang, Yong ;
Guo, Da ;
Yao, Lei ;
Li, Zhao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 134 :154-169
[33]   ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform [J].
Wang, Yulong ;
Wang, Qixu ;
Chen, Xingshu ;
Chen, Dajiang ;
Fang, Xiaojie ;
Yin, Mingyong ;
Zhang, Ning .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) :3327-3336
[34]   Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection [J].
Wang, Jianyu ;
Pan, Jianli ;
AlQerm, Ismail ;
Liu, Yuanni .
30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
[35]   Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks [J].
Lin, Jiaying ;
Wei, Yehua ;
Li, Wenjia ;
Long, Jing .
UBIQUITOUS SECURITY, 2022, 1557 :255-267
[36]   GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection [J].
Ghadermazi, Jalal ;
Hore, Soumyadeep ;
Shah, Ankit ;
Bastian, Nathaniel D. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 :4026-4041
[37]   A Deep Learning-Based Framework for Real-Time Detection of Cybersecurity Threats in IoT Environments [J].
Almalki, Sultan Saaed .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (03) :430-439
[38]   Intrusion Detection and Network Information Security Based on Deep Learning Algorithm in Urban Rail Transit Management System [J].
Wang, Zhongru ;
Xie, Xinzhou ;
Chen, Lei ;
Song, Shouyou ;
Wang, Zhongjie .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) :2135-2143
[39]   Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation [J].
Ilha, Alexandre da Silveira ;
Lapolli, Angelo Cardoso ;
Marques, Jonatas Adilson ;
Gaspary, Luciano Paschoal .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03) :3121-3139
[40]   Real-time Activity Identification In a Smart FBG-based Fiber-optic Perimeter Intrusion Detection System [J].
Wu, Huijuan ;
Lu, Xianglin ;
Li, Shanshan ;
Wu, Yu ;
Rao, Yunjiang .
22ND INTERNATIONAL CONFERENCE ON OPTICAL FIBER SENSORS, PTS 1-3, 2012, 8421