Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems

被引:5
|
作者
Chale, Marc [1 ,2 ]
Cox, Bruce [1 ]
Weir, Jeffery [1 ]
Bastian, Nathaniel D. [1 ,2 ]
机构
[1] Air Force Inst Technol, Dept Operat Sci, 2950 Hobson Way, Wright Patterson Afb, OH 45433 USA
[2] US Mil Acad, Army Cyber Inst, New South Post Rd, West Point, NY 10996 USA
关键词
Cyber security; Network intrusion detection; Adversarial machine learning; Constrained optimization; Meta-heuristic;
D O I
10.1007/s11590-023-02007-7
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Deep learning has enabled network intrusion detection rates as high as 99.9% for malicious network packets without requiring feature engineering. Adversarial machine learning methods have been used to evade classifiers in the computer vision domain; however, existing methods do not translate well into the constrained cyber domain as they tend to produce non-functional network packets. This research views the payload of network packets as code with many functional units. A meta-heuristic based generative model is developed to maximize classification loss of packet payloads with respect to a surrogate model by repeatedly substituting units of code with functionally equivalent counterparts. The perturbed packets are then transferred and tested against three test network intrusion detection system classifiers with various evasion rates that depend on the classifier and malicious packet type. If the test classifier is of the same architecture as the surrogate model, near-optimal adversarial examples penetrate the test model for 69% of packets whereas the raw examples succeeds for only 5% of packets. This confirms hypotheses that NIDS classifiers are vulnerable to adversarial attacks, motivating research in robust learning for cyber.
引用
收藏
页码:2169 / 2188
页数:20
相关论文
共 50 条
  • [1] Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning
    Yang, Ziyuan
    Qu, Haipeng
    Hua, Ying
    Zhang, Xiaoshuai
    Lin, Xijun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 146 - 157
  • [2] Adversarial Attacks Against Network Intrusion Detection in IoT Systems
    Qiu, Han
    Dong, Tian
    Zhang, Tianwei
    Lu, Jialiang
    Memmi, Gerard
    Qiu, Meikang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10327 - 10335
  • [3] Adversarial attacks against supervised machine learning based network intrusion detection systems
    Alshahrani, Ebtihaj
    Alghazzawi, Daniyal
    Alotaibi, Reem
    Rabie, Osama
    PLOS ONE, 2022, 17 (10):
  • [4] TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
    Debicha, Islam
    Bauwens, Richard
    Debatty, Thibault
    Dricot, Jean -Michel
    Kenaza, Tayeb
    Mees, Wim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 185 - 197
  • [5] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [6] Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
    Apruzzese, Giovanni
    Andreolini, Mauro
    Ferretti, Luca
    Marchetti, Mirco
    Colajanni, Michele
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03):
  • [7] Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
    Usama, Muhammad
    Asim, Muhammad
    Latif, Siddique
    Qadir, Junaid
    Ala-Al-Fuqaha
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 78 - 83
  • [8] Defending network intrusion detection systems against adversarial evasion attacks
    Pawlicki, Marek
    Choras, Michal
    Kozik, Rafal
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 148 - 154
  • [9] Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers
    Liu, Tzong-Jye
    COMPUTER JOURNAL, 2024, 67 (02): : 728 - 745
  • [10] LpAdvGAN: Noise Optimization Based Adversarial Network Generation Adversarial Example
    Yang, Delong
    Liu, Jing
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,