Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach

被引:0
|
作者
Li, Xiping [1 ]
Dong, Wei [1 ]
Sun, Yi [2 ]
Chen, Shaolong [1 ]
Kong, Detong [1 ]
Yang, Shujie [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Natl Pilot Software Engn Sch, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Shenzhen Inst, Shenzhen 518000, Peoples R China
来源
20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024 | 2024年
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Adversarial attack; Generative adversarial networks; Intrusion detection systems; Black-box attack; PREDICTION;
D O I
10.1109/IWCMC61514.2024.10592493
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection Systems (IDS) are essential tools in network security, which aims to identify malicious traffic to safeguard computers. In recent years, with the application and advancement of machine learning in fields such as image recognition, autonomous driving, and natural language processing (NLP), machine learning-based intrusion detection systems have also rapidly developed. Unfortunately, such IDSs exhibit poor defensive capabilities when facing carefully crafted and imperceptible adversarial attacks. Adversarial attacks manipulate adversarial samples, causing malicious traffic to be misclassified as normal traffic, thereby bypassing intrusion detection systems. Given that adversarial attacks on IDSs in the real world largely operate under the premise of model agnosticism, this paper proposes a black-box attack based on Generative Adversarial Networks (GANs) and active learning. During the iterative training of GANs, the discriminator is covertly constructed as a shadow model of the target IDS, and a generator capable of generating adversarial malicious traffic is trained. Finally, leveraging the transferability of adversarial attacks to DNN, the attack implemented on the shadow model is transferred to the target model, thereby attacking the intrusion detector. Unlike adversarial attacks against image classifiers, adversarial attacks against IDSs must also consider whether the added adversarial perturbations will affect the semantics and functionality of the original malicious traffic. Therefore, the constraint mechanism for modifying feature values is also an important consideration in this paper.
引用
收藏
页码:1364 / 1369
页数:6
相关论文
共 50 条
  • [21] Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML
    Alahmed, Shahad
    Alasad, Qutaiba
    Hammood, Maytham M.
    Yuan, Jiann-Shiun
    Alawad, Mohammed
    COMPUTERS, 2022, 11 (07)
  • [22] RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks
    Sarikaya, Alper
    Kilic, Banu Gunel
    Demirci, Mehmet
    COMPUTERS & SECURITY, 2023, 135
  • [23] Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
    Hashemi, Mohammad J.
    Keller, Eric
    2020 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2020, : 37 - 43
  • [24] Defending the Defender: Detecting Adversarial Examples for Network Intrusion Detection Systems
    Khettaf, Dalila
    Bouzar-Benlabiod, Lydia
    2024 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE, IRI 2024, 2024, : 150 - 155
  • [25] Fuzzy ESVDF approach for Intrusion Detection Systems
    Zaman, Safaa
    Karray, Fakhri
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 539 - 545
  • [26] A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems
    Mohammadian, Hesamodin
    Ghorbani, Ali A.
    Lashkari, Arash Habibi
    APPLIED SOFT COMPUTING, 2023, 137
  • [27] Testing Intrusion Detection Systems: An engineered approach
    El Rab, Mohammed S. Gad
    El Kalam, Anas Abou
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND APPLICATIONS, 2006, : 270 - +
  • [28] Reflective Adversarial Attacks against Pedestrian Detection Systems for Vehicles at Night
    Chen, Yuanwan
    Wu, Yalun
    Cui, Xiaoshu
    Li, Qiong
    Liu, Jiqiang
    Niu, Wenjia
    SYMMETRY-BASEL, 2024, 16 (10):
  • [29] An enhanced ensemble defense framework for boosting adversarial robustness of intrusion detection systems
    Zeinab Awad
    Magdy Zakaria
    Rasha Hassan
    Scientific Reports, 15 (1)
  • [30] Adversarial Sample Generation Based on Model Simulation Analysis in Intrusion Detection Systems
    Sun, Jiankang
    Yang, Shujie
    ELECTRONICS, 2025, 14 (05):