Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach

被引:0
|
作者
Li, Xiping [1 ]
Dong, Wei [1 ]
Sun, Yi [2 ]
Chen, Shaolong [1 ]
Kong, Detong [1 ]
Yang, Shujie [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Natl Pilot Software Engn Sch, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Shenzhen Inst, Shenzhen 518000, Peoples R China
来源
20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024 | 2024年
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Adversarial attack; Generative adversarial networks; Intrusion detection systems; Black-box attack; PREDICTION;
D O I
10.1109/IWCMC61514.2024.10592493
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection Systems (IDS) are essential tools in network security, which aims to identify malicious traffic to safeguard computers. In recent years, with the application and advancement of machine learning in fields such as image recognition, autonomous driving, and natural language processing (NLP), machine learning-based intrusion detection systems have also rapidly developed. Unfortunately, such IDSs exhibit poor defensive capabilities when facing carefully crafted and imperceptible adversarial attacks. Adversarial attacks manipulate adversarial samples, causing malicious traffic to be misclassified as normal traffic, thereby bypassing intrusion detection systems. Given that adversarial attacks on IDSs in the real world largely operate under the premise of model agnosticism, this paper proposes a black-box attack based on Generative Adversarial Networks (GANs) and active learning. During the iterative training of GANs, the discriminator is covertly constructed as a shadow model of the target IDS, and a generator capable of generating adversarial malicious traffic is trained. Finally, leveraging the transferability of adversarial attacks to DNN, the attack implemented on the shadow model is transferred to the target model, thereby attacking the intrusion detector. Unlike adversarial attacks against image classifiers, adversarial attacks against IDSs must also consider whether the added adversarial perturbations will affect the semantics and functionality of the original malicious traffic. Therefore, the constraint mechanism for modifying feature values is also an important consideration in this paper.
引用
收藏
页码:1364 / 1369
页数:6
相关论文
共 50 条
  • [31] Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems
    Asimopoulos, Dimitrios Christos
    Radoglou-Grammatikis, Panagiotis
    Makris, Ioannis
    Mladenov, Valeri
    Psannis, Konstantinos E.
    Goudos, Sotirios
    Sarigiannidis, Panagiotis
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [32] A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and Challenges
    Luis Gutierrez-Garcia, Jose
    Sanchez-DelaCruz, Eddy
    del Pilar Pozos-Parra, Maria
    ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 59 - 78
  • [33] A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems
    Khoei, Tala Talaei
    Kaabouch, Naima
    INFORMATION, 2023, 14 (02)
  • [34] Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks
    El Asry, Chadia
    Benchaji, Ibtissam
    Douzi, Samira
    El Ouahidi, Bouabid
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2024, 15 (09) : 1070 - 1078
  • [35] Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems
    Cao, Yuanjiang
    Chen, Xiaocong
    Yao, Lina
    Wang, Xianzhi
    Zhang, Wei Emma
    PROCEEDINGS OF THE 43RD INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '20), 2020, : 1669 - 1672
  • [36] Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System
    Zhou, Xiaokang
    Liang, Wei
    Li, Weimin
    Yan, Ke
    Shimizu, Shohei
    Wang, Kevin I-Kai
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9310 - 9319
  • [37] A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions
    Al-Ajlan, Monirah
    Ykhlef, Mourad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (02): : 2053 - 2076
  • [38] Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice
    Silva, Rui Filipe
    Barbosa, Raul
    Bernardino, Jorge
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (02) : 20 - 40
  • [39] IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system
    Barik, Kousik
    Misra, Sanjay
    SOFTWARE IMPACTS, 2024, 21
  • [40] Fortifying Machine Learning-Powered Intrusion Detection: A Defense Strategy Against Adversarial Black-Box Attacks
    Pujari, Medha
    Sun, Weiqing
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 5, ICICT 2024, 2024, 1000 : 655 - 671