XAI-driven Adversarial Attacks on Network Intrusion Detectors

被引:1
|
作者
Okada, Satoshi [1 ]
Jmila, Houda [2 ]
Akashi, Kunio [1 ]
Mitsunaga, Takuho [1 ,3 ]
Sekiya, Yuji [1 ]
Takase, Hideki
Blanc, Gregory [4 ]
Nakamura, Hiroshi [1 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] Univ Paris Saclay, CEA, List, Palaiseau, France
[3] Toyo Univ, INIAD, Tokyo, Japan
[4] Inst Polytech Paris, SAMOVAR, Telecom SudParis, Palaiseau, France
来源
PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024 | 2024年
关键词
Adversarial Example; XAI; NIDS; Cyber Security; BLACK-BOX; LEVEL;
D O I
10.1145/3655693.3655714
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep Learning (DL) technologies have recently gained significant attention and have been applied to Network Intrusion Detection Systems (NIDS). However, DL is known to be vulnerable to adversarial attacks, which evade detection by introducing perturbations to input data. Meanwhile, eXplainable Artificial Intelligence (XAI) helps us to understand predictions made by DL models and is an essential technology for ensuring accountability. This paper focuses on the relationship between the DL model's decision-making processes and adversarial examples (AEs) and proposes a new AE generation method based on XAI. Our method utilizes XAI to identify important features when making predictions and perturb them in real (traffic) space to evade detection by DL-based NIDS. We implemented our proposed method in a real-world network environment. We confirmed that our AEs completely evade detection without compromising the malicious nature of the attack communications. This experiment reveals that, unlike many existing studies, our proposed method is feasible in the traffic space.
引用
收藏
页码:65 / 73
页数:9
相关论文
共 50 条
  • [1] Xai-driven black-box adversarial attacks on network intrusion detectors
    Okada, Satoshi
    Jmila, Houda
    Akashi, Kunio
    Mitsunaga, Takuho
    Sekiya, Yuji
    Takase, Hideki
    Blanc, Gregory
    Nakamura, Hiroshi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (03)
  • [2] ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors
    Homoliak, Ivan
    Malinka, Kamil
    Hanacek, Petr
    IEEE ACCESS, 2020, 8 : 112427 - 112453
  • [3] Toward Transferable Adversarial Attacks Against Autoencoder-Based Network Intrusion Detectors
    Zhang, Yihang
    Wu, Yingwen
    Huang, Xiaolin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (12) : 13863 - 13872
  • [4] XAI-driven antivirus in pattern identification of citadel malware
    dos Santos, Carlos Henrique Macedo
    de Lima, Sidney Marlon Lopes
    JOURNAL OF COMPUTATIONAL SCIENCE, 2024, 82
  • [5] XAI-driven CatBoost multi-layer perceptron neural network for analyzing breast cancer
    Srinivasu, P. Naga
    Lakshmi, G. Jaya
    Gudipalli, Abhishek
    Narahari, Sujatha Canavoy
    Shafi, Jana
    Wozniak, Marcin
    Ijaz, Muhammad Fazal
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [6] XAI-Driven Explainable Multi-view Game Cheating Detection
    Tao, Jianrong
    Xiong, Yu
    Zhao, Shiwei
    Xu, Yuhong
    Lin, Jianshi
    Wu, Runze
    Fan, Changjie
    2020 IEEE CONFERENCE ON GAMES (IEEE COG 2020), 2020, : 144 - 151
  • [7] XAI-Driven Lightweight Multiscale ConvLSTM Architecture for Video Violence Detection
    Provath, Md Al-Mamun
    Deb, Kaushik
    Jo, Kang Hyun
    2024 33RD INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, ISIE 2024, 2024,
  • [8] XAI-driven model for crop recommender system for use in precision agriculture
    Srinivasu, Parvathaneni Naga
    Ijaz, Muhammad Fazal
    Wozniak, Marcin
    COMPUTATIONAL INTELLIGENCE, 2024, 40 (01)
  • [9] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 763 - 775
  • [10] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Mohamed Amine Merzouk
    Frédéric Cuppens
    Nora Boulahia-Cuppens
    Reda Yaich
    Annals of Telecommunications, 2022, 77 : 763 - 775