IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system

被引:6
作者
Barik, Kousik [1 ]
Misra, Sanjay [2 ,3 ,4 ]
机构
[1] Univ Alcala, Dept Comp Sci, Madrid, Spain
[2] Ostfold Univ Coll, Dept Comp Sci & Commun, Halden, Norway
[3] Inst Energy Technol, Dept Appl Data Sci, Halden, Norway
[4] Inst Energy Technol, Halden, Norway
关键词
Adversarial attack; Intrusion detection system; Cybersecurity; Adversarial machine learning; Adversarial defense;
D O I
10.1016/j.simpa.2024.100664
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An intrusion detection system (IDS) is critical in protecting organizations from cyber threats. The susceptibility of Machine Learning and Deep Learning-based IDSs against adversarial attacks arises from malicious actors' deliberate construction of adversarial samples. This study proposes a Python-based open-source code repository named IDS-Anta with a robust defense mechanism to identify adversarial attacks without compromising IDS performance. It uses Multi-Armed Bandits with Thomson Sampling, Ant Colony Optimization (ACO), and adversarial attack generation methods and is validated using three public benchmark datasets. This code repository can be readily applied and replicated on IDS datasets against adversarial attacks.
引用
收藏
页数:5
相关论文
共 26 条
[1]   RETRACTED: Towards an efficient model for network intrusion detection system (IDS): systematic literature review (Retracted article. See vol. 31, pg. 4415, 2025) [J].
Abdulganiyu, Oluwadamilare Harazeem ;
Tchakoucht, Taha Ait ;
Saheed, Yakub Kayode .
WIRELESS NETWORKS, 2024, 30 (01) :453-482
[2]   Toward support-vector machine-based ant colony optimization algorithms for intrusion detection [J].
Alqarni, Ahmed Abdullah .
SOFT COMPUTING, 2023, 27 (10) :6297-6305
[3]   Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks [J].
Alsarhan, Ayoub ;
Alauthman, Mohammad ;
Alshdaifat, Esra'a ;
Al-Ghuwairi, Abdel-Rahman ;
Al-Dubai, Ahmed .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (5) :6113-6122
[4]   Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network [J].
Barik, Kousik ;
Misra, Sanjay ;
Fernandez-Sanz, Luis .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) :2353-2376
[5]   Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study [J].
Barik, Kousik ;
Misra, Sanjay ;
Konar, Karabi ;
Fernandez-Sanz, Luis ;
Murat, Koyuncu .
APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
[6]   Defense strategies for Adversarial Machine Learning: A survey [J].
Bountakas, Panagiotis ;
Zarras, Apostolis ;
Lekidis, Alexios ;
Xenakis, Christos .
COMPUTER SCIENCE REVIEW, 2023, 49
[7]   MABAT: A Multi-Armed Bandit Approach for Threat-Hunting [J].
Dekel, Liad ;
Leybovich, Ilia ;
Zilberman, Polina ;
Puzis, Rami .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :477-490
[8]   Adversarial robustness improvement for deep neural networks [J].
Eleftheriadis, Charis ;
Symeonidis, Andreas ;
Katsaros, Panagiotis .
MACHINE VISION AND APPLICATIONS, 2024, 35 (03)
[9]   A review of Machine Learning-based zero-day attack detection: Challenges and future directions [J].
Guo, Yang .
COMPUTER COMMUNICATIONS, 2023, 198 :175-185
[10]   Interpreting Adversarial Examples in Deep Learning: A Review [J].
Han, Sicong ;
Lin, Chenhao ;
Shen, Chao ;
Wang, Qian ;
Guan, Xiaohong .
ACM COMPUTING SURVEYS, 2023, 55 (14S)