A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks

被引:0
作者
Nathaniel, Dhinakaran [1 ]
Soosai, Anto [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
computer networks; computer security; machine learning; firewalls; intrusion detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, machine learning (ML) has had a significant influence on the discipline of computer security. In network security, intrusion detection systems increasingly employ machine learning techniques. Approaches based on machine learning have substantially improved the efficacy of intrusion detection. Adaptive adversaries who comprehend the underlying principles of ML techniques can initiate attacks against the classification engine of an intrusion detection system. Malicious actors exploit machine learning model vulnerabilities. Network security, specifically intrusion detection systems, requires the development of defensive strategies to combat this threat. The RF-RSE (Random Forest based Random Subspace Ensemble) and RF-RSE-AT (RFRSE-Adversarial Training) methods are proposed as network intrusion detection systems to defend against adversarial attacks. The methodologies proposed are evaluated using the NSL-KDD dataset. The RF-RSE method demonstrates remarkable resistance to adversary attacks. The RF-RSE-AT method performs exceptionally well in correctly identifying network traffic classes when presented with adversarial attacks, and it maintains its accuracy even when no attack is present.
引用
收藏
页码:81 / 88
页数:8
相关论文
共 30 条
  • [1] Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic
    Abdulhammed, Razan
    Faezipour, Miad
    Abuzneid, Abdelshakour
    AbuMallouh, Arafat
    [J]. IEEE SENSORS LETTERS, 2019, 3 (01)
  • [2] A deep learning approach for proactive multi-cloud cooperative intrusion detection system
    Abusitta, Adel
    Bellaiche, Martine
    Dagenais, Michel
    Halabi, Talal
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 98 : 308 - 318
  • [3] Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
    Anthi, Eirini
    Williams, Lowri
    Laved, Amir
    Burnap, Pete
    [J]. COMPUTERS & SECURITY, 2021, 108
  • [4] Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems
    Anthi, Eirini
    Williams, Lowri
    Rhode, Matilda
    Burnap, Pete
    Wedgbury, Adam
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [5] Begli MohammadReza, 2019, 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE). Proceedings, P120, DOI 10.1109/SEGE.2019.8859950
  • [6] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [7] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [8] Boosting Adversarial Attacks with Momentum
    Dong, Yinpeng
    Liao, Fangzhou
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    Hu, Xiaolin
    Li, Jianguo
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 9185 - 9193
  • [9] dry Ma., 2017, INT C LEARN REPR ICL, V1050, P9, DOI DOI 10.48550/ARXIV.1706.06083
  • [10] A hybrid network intrusion detection framework based on random forests and weighted k-means
    Elbasiony, Reda M.
    Sallam, Elsayed A.
    Eltobely, Tarek E.
    Fahmy, Mahmoud M.
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2013, 4 (04) : 753 - 762