Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

被引:59
作者
Apruzzese, Giovanni [1 ]
Andreolini, Mauro [2 ]
Ferretti, Luca [2 ]
Marchetti, Mirco [3 ]
Colajanni, Michele [4 ]
机构
[1] Univ Liechtenstein, Inst Informat Syst, Vaduz, Liechtenstein
[2] Univ Modena & Reggio Emilia, Dept Phys Informat & Math, Modena, Italy
[3] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, Modena, Italy
[4] Univ Bologna, Dept Informat Sci & Engn, Bologna, Italy
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2022年 / 3卷 / 03期
关键词
Cybersecurity; network intrusion detection; adversarial attacks; evasion; NIDS; CLASSIFIERS; TAXONOMY;
D O I
10.1145/3469659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The incremental diffusion of machine learning algorithms in supporting cybersecurity is creating novel defensive opportunities but also new types of risks. Multiple researches have shown that machine learning methods are vulnerable to adversarial attacks that create tiny perturbations aimed at decreasing the effectiveness of detecting threats. We observe that existing literature assumes threat models that are inappropriate for realistic cybersecurity scenarios, because they consider opponents with complete knowledge about the cyber detector or that can freely interact with the target systems. By focusing on Network Intrusion Detection Systems based on machine learning, we identify and model the real capabilities and circumstances required by attackers to carry out feasible and successful adversarial attacks. We then apply our model to several adversarial attacks proposed in literature and highlight the limits and merits that can result in actual adversarial attacks. The contributions of this article can help hardening defensive systems by letting cyber defenders address the most critical and real issues and can benefit researchers by allowing them to devise novel forms of adversarial attacks based on realistic threat models.
引用
收藏
页数:19
相关论文
共 108 条
[1]   Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization [J].
Abou Khamis, Rana ;
Shafiq, M. Omair ;
Matrawy, Ashraf .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[2]   Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs [J].
Aiken, James ;
Scott-Hayward, Sandra .
2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
[3]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[4]   Adversarial machine learning in Network Intrusion Detection Systems [J].
Alhajjar, Elie ;
Maxwell, Paul ;
Bastian, Nathaniel .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
[5]  
Andreolini Mauro, 2014, 4th International Conference on Cloud Computing and Services Science (CLOSER 2014). Proceedings, P341
[6]  
[Anonymous], 2011, Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, DOI DOI 10.1145/1978672.1978676
[7]  
[Anonymous], 2020, Malware Traffic Analysis Dataset
[8]  
[Anonymous], 2020, A Complete List of All (arXiv) Adversarial Example Papers
[9]   Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems [J].
Anthi, Eirini ;
Williams, Lowri ;
Rhode, Matilda ;
Burnap, Pete ;
Wedgbury, Adam .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
[10]   Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks [J].
Apruzzese, Giovanni ;
Andreolini, Mauro ;
Marchetti, Mirco ;
Venturi, Andrea ;
Colajanni, Michele .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04) :1975-1987