Generating practical adversarial examples against learning-based network intrusion detection systems

被引:2
|
作者
Kumar, Vivek [1 ,2 ]
Kumar, Kamal [3 ]
Singh, Maheep [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Srinagar 246174, Uttarakhand, India
[2] THDC Inst Hydropower Engn & Technol, Dept Comp Sci & Engn, Tehri 249124, Uttarakhand, India
[3] IGDTUW, Dept Informat Technol, Delhi 110006, India
关键词
Adversarial example; Domain constraints; Deep learning; Machine learning; Variational autoencoder; ATTACKS;
D O I
10.1007/s12243-024-01021-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
There has been a significant development in the design of intrusion detection systems (IDS) by using deep learning (DL)/machine learning (ML) methods for detecting threats in a computer network. Unfortunately, these DL/ML-based IDS are vulnerable to adversarial examples, wherein a malicious data sample can be slightly perturbed to cause a misclassification by an IDS while retaining its malicious properties. Unlike image recognition domain, the network domain has certain constraints known as domain constraints which are multifarious interrelationships and dependencies between features. To be considered as practical and realizable, an adversary must ensure that the adversarial examples comply with domain constraints. Recently, generative models like GANs and VAEs have been extensively used for generating adversarial examples against IDS. However, majority of these techniques generate adversarial examples which do not satisfy all domain constraints. Also, current generative methods lack explicit restrictions on the amount of perturbation which a malicious data sample undergoes during the crafting of adversarial examples, leading to the potential generation of invalid data samples. To address these limitations, a solution is presented in this work which utilize a variational autoencoder to generate adversarial examples that not only result in misclassification by an IDS, but also satisfy domain constraints. Instead of perturbing the data samples itself, the adversarial examples are crafted by perturbing the latent space representation of the data sample. It allows the generation of adversarial examples under limited perturbation. This research has explored the novel applications of generative networks for generating constraint satisfying adversarial examples. The experimental results support the claims with an attack success rate of 64.8%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\%$$\end{document} against ML/DL-based IDS. The trained model can be integrated further into an operational IDS to strengthen its robustness against adversarial examples; however, this is out of scope of this work.
引用
收藏
页码:209 / 226
页数:18
相关论文
共 50 条
  • [31] Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature Review
    Mutembei, Leonard L.
    Senekane, Makhamisa C.
    van Zyl, Terence
    ARTIFICIAL INTELLIGENCE RESEARCH, SACAIR 2024, 2025, 2326 : 207 - 234
  • [32] The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems
    Apruzzese, Giovanni
    Pajola, Luca
    Conti, Mauro
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 5152 - 5169
  • [33] Deep learning-based network intrusion detection in smart healthcare enterprise systems
    Ravi, Vinayakumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (13) : 39097 - 39115
  • [34] Deep learning-based network intrusion detection in smart healthcare enterprise systems
    Vinayakumar Ravi
    Multimedia Tools and Applications, 2024, 83 : 39097 - 39115
  • [35] ENIDS: A Deep Learning-Based Ensemble Framework for Network Intrusion Detection Systems
    Sayem, Ibrahim Mohammed
    Sayed, Moinul Islam
    Saha, Sajal
    Haque, Anwar
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (05): : 5809 - 5825
  • [36] A Residual Learning-Based Network Intrusion Detection System
    Man, Jiarui
    Sun, Guozi
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [37] VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems
    Guangrui LIU
    Weizhe ZHANG
    Xinjie LI
    Kaisheng FAN
    Shui YU
    Science China(Information Sciences), 2022, 65 (07) : 32 - 50
  • [38] VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems
    Guangrui Liu
    Weizhe Zhang
    Xinjie Li
    Kaisheng Fan
    Shui Yu
    Science China Information Sciences, 2022, 65
  • [39] VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems
    Liu, Guangrui
    Zhang, Weizhe
    Li, Xinjie
    Fan, Kaisheng
    Yu, Shui
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [40] Statistical Detection of Adversarial Examples in Blockchain-Based Federated Forest In-Vehicle Network Intrusion Detection Systems
    Aliyu, Ibrahim
    Van Engelenburg, Selinde
    Mu'azu, Muhammed Bashir
    Kim, Jinsul
    Lim, Chang Gyoon
    IEEE ACCESS, 2022, 10 : 109366 - 109384