Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems

被引:5
作者
Chale, Marc [1 ,2 ]
Cox, Bruce [1 ]
Weir, Jeffery [1 ]
Bastian, Nathaniel D. [1 ,2 ]
机构
[1] Air Force Inst Technol, Dept Operat Sci, 2950 Hobson Way, Wright Patterson Afb, OH 45433 USA
[2] US Mil Acad, Army Cyber Inst, New South Post Rd, West Point, NY 10996 USA
关键词
Cyber security; Network intrusion detection; Adversarial machine learning; Constrained optimization; Meta-heuristic;
D O I
10.1007/s11590-023-02007-7
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Deep learning has enabled network intrusion detection rates as high as 99.9% for malicious network packets without requiring feature engineering. Adversarial machine learning methods have been used to evade classifiers in the computer vision domain; however, existing methods do not translate well into the constrained cyber domain as they tend to produce non-functional network packets. This research views the payload of network packets as code with many functional units. A meta-heuristic based generative model is developed to maximize classification loss of packet payloads with respect to a surrogate model by repeatedly substituting units of code with functionally equivalent counterparts. The perturbed packets are then transferred and tested against three test network intrusion detection system classifiers with various evasion rates that depend on the classifier and malicious packet type. If the test classifier is of the same architecture as the surrogate model, near-optimal adversarial examples penetrate the test model for 69% of packets whereas the raw examples succeeds for only 5% of packets. This confirms hypotheses that NIDS classifiers are vulnerable to adversarial attacks, motivating research in robust learning for cyber.
引用
收藏
页码:2169 / 2188
页数:20
相关论文
共 50 条
  • [21] Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
    Alotaibi, Afnan
    Rassam, Murad A.
    [J]. FUTURE INTERNET, 2023, 15 (02)
  • [22] Defending the Defender: Detecting Adversarial Examples for Network Intrusion Detection Systems
    Khettaf, Dalila
    Bouzar-Benlabiod, Lydia
    [J]. 2024 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE, IRI 2024, 2024, : 150 - 155
  • [23] An Adversarial Approach for Explainable AI in Intrusion Detection Systems
    Marino, Daniel L.
    Wickramasinghe, Chathurika S.
    Manic, Milos
    [J]. IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 3237 - 3243
  • [24] XAI-driven Adversarial Attacks on Network Intrusion Detectors
    Okada, Satoshi
    Jmila, Houda
    Akashi, Kunio
    Mitsunaga, Takuho
    Sekiya, Yuji
    Takase, Hideki
    Blanc, Gregory
    Nakamura, Hiroshi
    [J]. PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024, 2024, : 65 - 73
  • [25] Network intrusion detection using equality constrained-optimization-based extreme learning machines
    Wang, Cheng-Ru
    Xu, Rong-Fang
    Lee, Shie-Jue
    Lee, Chie-Hong
    [J]. KNOWLEDGE-BASED SYSTEMS, 2018, 147 : 68 - 80
  • [26] Advances in Adversarial Attacks and Defenses in Intrusion Detection System: A Survey
    Mbow, Mariama
    Sakurai, Kouichi
    Koide, Hiroshi
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 196 - 212
  • [27] A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems
    Mohammadian, Hesamodin
    Ghorbani, Ali A.
    Lashkari, Arash Habibi
    [J]. APPLIED SOFT COMPUTING, 2023, 137
  • [28] DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems
    Venturi, Andrea
    Apruzzese, Giovanni
    Andreolini, Mauro
    Colajanni, Michele
    Marchetti, Mirco
    [J]. DATA IN BRIEF, 2021, 34
  • [29] Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems
    Venkatesan, Sridhar
    Sikka, Harshvardhan
    Izmailov, Rauf
    Chadha, Ritu
    Oprea, Alina
    de Lucia, Michael J.
    [J]. 2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [30] Statistical Detection of Adversarial Examples in Blockchain-Based Federated Forest In-Vehicle Network Intrusion Detection Systems
    Aliyu, Ibrahim
    Van Engelenburg, Selinde
    Mu'azu, Muhammed Bashir
    Kim, Jinsul
    Lim, Chang Gyoon
    [J]. IEEE ACCESS, 2022, 10 : 109366 - 109384