Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach

被引:0
|
作者
Li, Xiping [1 ]
Dong, Wei [1 ]
Sun, Yi [2 ]
Chen, Shaolong [1 ]
Kong, Detong [1 ]
Yang, Shujie [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Natl Pilot Software Engn Sch, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Shenzhen Inst, Shenzhen 518000, Peoples R China
来源
20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024 | 2024年
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Adversarial attack; Generative adversarial networks; Intrusion detection systems; Black-box attack; PREDICTION;
D O I
10.1109/IWCMC61514.2024.10592493
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection Systems (IDS) are essential tools in network security, which aims to identify malicious traffic to safeguard computers. In recent years, with the application and advancement of machine learning in fields such as image recognition, autonomous driving, and natural language processing (NLP), machine learning-based intrusion detection systems have also rapidly developed. Unfortunately, such IDSs exhibit poor defensive capabilities when facing carefully crafted and imperceptible adversarial attacks. Adversarial attacks manipulate adversarial samples, causing malicious traffic to be misclassified as normal traffic, thereby bypassing intrusion detection systems. Given that adversarial attacks on IDSs in the real world largely operate under the premise of model agnosticism, this paper proposes a black-box attack based on Generative Adversarial Networks (GANs) and active learning. During the iterative training of GANs, the discriminator is covertly constructed as a shadow model of the target IDS, and a generator capable of generating adversarial malicious traffic is trained. Finally, leveraging the transferability of adversarial attacks to DNN, the attack implemented on the shadow model is transferred to the target model, thereby attacking the intrusion detector. Unlike adversarial attacks against image classifiers, adversarial attacks against IDSs must also consider whether the added adversarial perturbations will affect the semantics and functionality of the original malicious traffic. Therefore, the constraint mechanism for modifying feature values is also an important consideration in this paper.
引用
收藏
页码:1364 / 1369
页数:6
相关论文
共 50 条
  • [1] On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks
    Choi, Jeongseok
    Kim, Hyoungshick
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 39 - 50
  • [2] Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier
    Kulikov, D. A.
    Platonov, V. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1080 - 1086
  • [3] Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier
    D. A. Kulikov
    V. V. Platonov
    Automatic Control and Computer Sciences, 2021, 55 : 1080 - 1086
  • [4] Adversarial Attack Detection Approach for Intrusion Detection Systems
    Degirmenci, Elif
    Ozcelik, Ilker
    Yazici, Ahmet
    IEEE ACCESS, 2024, 12 : 195996 - 196009
  • [5] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [6] Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers
    Liu, Tzong-Jye
    COMPUTER JOURNAL, 2024, 67 (02): : 728 - 745
  • [7] Improved Robust Adversarial Model against Evasion Attacks on Intrusion Detection Systems
    Anaedevha, R. N.
    Trofimov, A. G.
    OPTICAL MEMORY AND NEURAL NETWORKS, 2024, 33 (SUPPL3) : S414 - S423
  • [8] Detection of Adversarial Attacks in AI-Based Intrusion Detection Systems Using Explainable AI
    Tcydenova, Erzhena
    Kim, Tae Woo
    Lee, Changhoon
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2021, 11
  • [9] Adversarial Attacks for Intrusion Detection Based on Bus Traffic
    He, Daojing
    Dai, Jiayu
    Liu, Xiaoxia
    Zhu, Shanshan
    Chan, Sammy
    Guizani, Mohsen
    IEEE NETWORK, 2022, 36 (04): : 203 - 209
  • [10] Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems
    P. E. Yugai
    D. A. Moskvin
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1226 - 1233