Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

被引:59
作者
Apruzzese, Giovanni [1 ]
Andreolini, Mauro [2 ]
Ferretti, Luca [2 ]
Marchetti, Mirco [3 ]
Colajanni, Michele [4 ]
机构
[1] Univ Liechtenstein, Inst Informat Syst, Vaduz, Liechtenstein
[2] Univ Modena & Reggio Emilia, Dept Phys Informat & Math, Modena, Italy
[3] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, Modena, Italy
[4] Univ Bologna, Dept Informat Sci & Engn, Bologna, Italy
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2022年 / 3卷 / 03期
关键词
Cybersecurity; network intrusion detection; adversarial attacks; evasion; NIDS; CLASSIFIERS; TAXONOMY;
D O I
10.1145/3469659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The incremental diffusion of machine learning algorithms in supporting cybersecurity is creating novel defensive opportunities but also new types of risks. Multiple researches have shown that machine learning methods are vulnerable to adversarial attacks that create tiny perturbations aimed at decreasing the effectiveness of detecting threats. We observe that existing literature assumes threat models that are inappropriate for realistic cybersecurity scenarios, because they consider opponents with complete knowledge about the cyber detector or that can freely interact with the target systems. By focusing on Network Intrusion Detection Systems based on machine learning, we identify and model the real capabilities and circumstances required by attackers to carry out feasible and successful adversarial attacks. We then apply our model to several adversarial attacks proposed in literature and highlight the limits and merits that can result in actual adversarial attacks. The contributions of this article can help hardening defensive systems by letting cyber defenders address the most critical and real issues and can benefit researchers by allowing them to devise novel forms of adversarial attacks based on realistic threat models.
引用
收藏
页数:19
相关论文
共 108 条
[51]   Adversarial Machine Learning - Industry Perspectives [J].
Kumar, Ram Shankar Siva ;
Nystrom, Magnus ;
Lambert, John ;
Marshall, Andrew ;
Goertzel, Mario ;
Comissoneru, Andi ;
Swann, Matt ;
Xia, Sharon .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, :69-75
[52]   Black Box Attacks on Deep Anomaly Detectors [J].
Kuppa, Aditya ;
Grzonkowski, Slawomir ;
Asghar, Muhammad Rizwan ;
Le-Khac, Nhien-An .
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
[53]   Characterization of Tor Traffic using Time based Features [J].
Lashkari, Arash Habibi ;
Gil, Gerard Draper ;
Mamun, Mohammad Saiful Islam ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :253-262
[54]  
Li Pan, 2018, IEEE INT C COMMUNICA
[55]   Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter [J].
Liang, Bin ;
Su, Miaoqiang ;
You, Wei ;
Shi, Wenchang ;
Yang, Gang .
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16), 2016, :345-356
[56]   Intrusion detection system: A comprehensive review [J].
Liao, Hung-Jen ;
Lin, Chun-Hung Richard ;
Lin, Ying-Chih ;
Tung, Kuang-Yuan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :16-24
[57]   IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection [J].
Lin, Zilong ;
Shi, Yong ;
Xue, Zhi .
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT III, 2022, 13282 :79-91
[58]   A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View [J].
Liu, Qiang ;
Li, Pan ;
Zhao, Wentao ;
Cai, Wei ;
Yu, Shui ;
Leung, Victor C. M. .
IEEE ACCESS, 2018, 6 :12103-12117
[59]  
Marchetti M, 2016, INT CONF CYBER CONFL, P243, DOI 10.1109/CYCON.2016.7529438
[60]  
Marino DL, 2018, IEEE IND ELEC, P3237, DOI 10.1109/IECON.2018.8591457