A Network Security Classifier Defense: Against Adversarial Machine Learning Attacks

被引:5
作者
De Lucia, Michael J. [1 ]
Cotton, Chase [2 ]
机构
[1] US Army Res Lab, Network Sci Div, Aberdeen Proving Ground, MD 21005 USA
[2] Univ Delaware, Dept Elect & Comp Engn, Newark, DE USA
来源
PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020 | 2020年
关键词
Adversarial Machine Learning; Machine Learning; Network Security; Cyber Security; Cyber Defense; ENSEMBLE;
D O I
10.1145/3395352.3402627
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The discovery of practical adversarial machine learning (AML) attacks against machine learning-based wired and wireless network security detectors has driven the necessity of a defense. Without a defense mechanism against AML, attacks in wired and wireless networks will go unnoticed by network security classifiers resulting in their ineffectiveness. Therefore, it is essential to motivate a defense against AML attacks for network security classifiers. Existing AML defenses are generally within the context of image recognition. However, these AML defenses have limited transferability to a network security context. Unlike image recognition, a subject matter expert generally derives the features of a network security classifier. Therefore, a network security classifier requires a distinctive strategy for defense. We propose a novel defense-in-depth approach for network security classifiers using a hierarchical ensemble of classifiers, each using a disparate feature set. Subsequently we show the effective use of our hierarchical ensemble to defend an existing network security classifier against an AML attack. Additionally, we discover a novel set of features to detect network scanning activity. Lastly, we propose to enhance our AML defense approach in future work. A shortcoming of our approach is the increased cost to the defender for implementation of each independent classifier. Therefore, we propose combining our AML defense with a moving target defense approach. Additionally, we propose to evaluate our AML defense with a variety of datasets and classifiers and evaluate the effectiveness of decomposing a classifier with many features into multiple classifiers, each with a small subset of the features.
引用
收藏
页码:67 / 73
页数:7
相关论文
共 23 条
  • [21] Tirenin W., 1999, MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341), P458, DOI 10.1109/MILCOM.1999.822725
  • [22] Venkatesan S, 2018, IEEE MILIT COMMUN C, P431, DOI 10.1109/MILCOM.2018.8599754
  • [23] Wei F, 2002, SIAM PROC S, P41