Adversarial robustness of deep reinforcement learning-based intrusion detection

被引:4
作者
Merzouk, Mohamed Amine [1 ,2 ]
Neal, Christopher [1 ,2 ]
Delas, Josephine [1 ,2 ]
Yaich, Reda [2 ]
Boulahia-Cuppens, Nora [1 ]
Cuppens, Frederic [1 ]
机构
[1] Polytech Montreal, Montreal, PQ, Canada
[2] IRT SystemX, Palaiseau, France
关键词
Adversarial machine learning; Adversarial examples; Intrusion detection; Deep reinforcement learning; Evasion attacks;
D O I
10.1007/s10207-024-00903-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning techniques, including Deep Reinforcement Learning (DRL), enhance intrusion detection systems by adapting to new threats. However, DRL's reliance on vulnerable deep neural networks leads to susceptibility to adversarial examples-perturbations designed to evade detection. While adversarial examples are well-studied in deep learning, their impact on DRL-based intrusion detection remains underexplored, particularly in critical domains. This article conducts a thorough analysis of DRL-based intrusion detection's vulnerability to adversarial examples. It systematically evaluates key hyperparameters such as DRL algorithms, neural network depth, and width, impacting agents' robustness. The study extends to black-box attacks, demonstrating adversarial transferability across DRL algorithms. Findings emphasize neural network architecture's critical role in DRL agent robustness, addressing underfitting and overfitting challenges. Practical implications include insights for optimizing DRL-based intrusion detection agents to enhance performance and resilience. Experiments encompass multiple DRL algorithms tested on three datasets: NSL-KDD, UNSW-NB15, and CICIoV2024, against gradient-based adversarial attacks, with publicly available implementation code.
引用
收藏
页码:3625 / 3651
页数:27
相关论文
共 70 条
[1]  
Abou ElHouda Z., 2024, IEEE T VEHICULAR TEC
[2]  
Ajay J., 2023, WHY CYBERSECURITY SH
[3]   Hidden Markov models for malware classification [J].
Annachhatre, Chinmayee ;
Austin, Thomas H. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :59-73
[4]  
Bajaj K., 2013, INT J COMPUTER APPL, P5, DOI [DOI 10.5120/13209-0587, 10.5120/13209-0587]
[5]  
Behzadan V., 2017, MACHINE LEARNING DAT
[6]  
Bruna J., 2014, INT C LEARN REPR
[7]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[8]   Adversarial environment reinforcement learning algorithm for intrusion detection [J].
Caminero, Guillermo ;
Lopez-Martin, Manuel ;
Carro, Belen .
COMPUTER NETWORKS, 2019, 159 :96-109
[9]   Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges [J].
Cevallos, Jesus F. M. ;
Rizzardi, Alessandra ;
Sicari, Sabrina ;
Porisini, Alberto Coen .
COMPUTER NETWORKS, 2023, 236
[10]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307