Generating practical adversarial examples against learning-based network intrusion detection systems

被引:2
|
作者
Kumar, Vivek [1 ,2 ]
Kumar, Kamal [3 ]
Singh, Maheep [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Srinagar 246174, Uttarakhand, India
[2] THDC Inst Hydropower Engn & Technol, Dept Comp Sci & Engn, Tehri 249124, Uttarakhand, India
[3] IGDTUW, Dept Informat Technol, Delhi 110006, India
关键词
Adversarial example; Domain constraints; Deep learning; Machine learning; Variational autoencoder; ATTACKS;
D O I
10.1007/s12243-024-01021-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
There has been a significant development in the design of intrusion detection systems (IDS) by using deep learning (DL)/machine learning (ML) methods for detecting threats in a computer network. Unfortunately, these DL/ML-based IDS are vulnerable to adversarial examples, wherein a malicious data sample can be slightly perturbed to cause a misclassification by an IDS while retaining its malicious properties. Unlike image recognition domain, the network domain has certain constraints known as domain constraints which are multifarious interrelationships and dependencies between features. To be considered as practical and realizable, an adversary must ensure that the adversarial examples comply with domain constraints. Recently, generative models like GANs and VAEs have been extensively used for generating adversarial examples against IDS. However, majority of these techniques generate adversarial examples which do not satisfy all domain constraints. Also, current generative methods lack explicit restrictions on the amount of perturbation which a malicious data sample undergoes during the crafting of adversarial examples, leading to the potential generation of invalid data samples. To address these limitations, a solution is presented in this work which utilize a variational autoencoder to generate adversarial examples that not only result in misclassification by an IDS, but also satisfy domain constraints. Instead of perturbing the data samples itself, the adversarial examples are crafted by perturbing the latent space representation of the data sample. It allows the generation of adversarial examples under limited perturbation. This research has explored the novel applications of generative networks for generating constraint satisfying adversarial examples. The experimental results support the claims with an attack success rate of 64.8%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\%$$\end{document} against ML/DL-based IDS. The trained model can be integrated further into an operational IDS to strengthen its robustness against adversarial examples; however, this is out of scope of this work.
引用
收藏
页码:209 / 226
页数:18
相关论文
共 50 条
  • [21] Adversarial Attacks Against Network Intrusion Detection in IoT Systems
    Qiu, Han
    Dong, Tian
    Zhang, Tianwei
    Lu, Jialiang
    Memmi, Gerard
    Qiu, Meikang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10327 - 10335
  • [22] Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning
    Sauka, Kudzai
    Shin, Gun-Yoo
    Kim, Dong-Wook
    Han, Myung-Mook
    APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [23] Adversarial robustness of deep reinforcement learning-based intrusion detection
    Merzouk, Mohamed Amine
    Neal, Christopher
    Delas, Josephine
    Yaich, Reda
    Boulahia-Cuppens, Nora
    Cuppens, Frederic
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (06) : 3625 - 3651
  • [24] Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems
    Yan, Haonan
    Li, Xiaoguang
    Zhang, Wenjing
    Wang, Rui
    Li, Hui
    Zhao, Xingwen
    Li, Fenghua
    Lin, Xiaodong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 153 - 167
  • [25] Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection
    Wang, Jianyu
    Pan, Jianli
    AlQerm, Ismail
    Liu, Yuanni
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [26] Transferability of Adversarial Examples in Machine Learning-based Malware Detection
    Hu, Yang
    Wang, Ning
    Chen, Yimin
    Lou, Wenjing
    Hou, Y. Thomas
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 28 - 36
  • [27] xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses
    Wei, Feng
    Li, Hongda
    Zhao, Ziming
    Hu, Hongxin
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4337 - 4354
  • [28] Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
    Apruzzese, Giovanni
    Andreolini, Mauro
    Ferretti, Luca
    Marchetti, Mirco
    Colajanni, Michele
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03):
  • [29] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [30] Defending network intrusion detection systems against adversarial evasion attacks
    Pawlicki, Marek
    Choras, Michal
    Kozik, Rafal
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 148 - 154