Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems

被引:7
作者
Chale, Marc [1 ,2 ]
Cox, Bruce [1 ]
Weir, Jeffery [1 ]
Bastian, Nathaniel D. [1 ,2 ]
机构
[1] Air Force Inst Technol, Dept Operat Sci, 2950 Hobson Way, Wright Patterson Afb, OH 45433 USA
[2] US Mil Acad, Army Cyber Inst, New South Post Rd, West Point, NY 10996 USA
关键词
Cyber security; Network intrusion detection; Adversarial machine learning; Constrained optimization; Meta-heuristic;
D O I
10.1007/s11590-023-02007-7
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Deep learning has enabled network intrusion detection rates as high as 99.9% for malicious network packets without requiring feature engineering. Adversarial machine learning methods have been used to evade classifiers in the computer vision domain; however, existing methods do not translate well into the constrained cyber domain as they tend to produce non-functional network packets. This research views the payload of network packets as code with many functional units. A meta-heuristic based generative model is developed to maximize classification loss of packet payloads with respect to a surrogate model by repeatedly substituting units of code with functionally equivalent counterparts. The perturbed packets are then transferred and tested against three test network intrusion detection system classifiers with various evasion rates that depend on the classifier and malicious packet type. If the test classifier is of the same architecture as the surrogate model, near-optimal adversarial examples penetrate the test model for 69% of packets whereas the raw examples succeeds for only 5% of packets. This confirms hypotheses that NIDS classifiers are vulnerable to adversarial attacks, motivating research in robust learning for cyber.
引用
收藏
页码:2169 / 2188
页数:20
相关论文
共 50 条
[31]   Statistical Detection of Adversarial Examples in Blockchain-Based Federated Forest In-Vehicle Network Intrusion Detection Systems [J].
Aliyu, Ibrahim ;
Van Engelenburg, Selinde ;
Mu'azu, Muhammed Bashir ;
Kim, Jinsul ;
Lim, Chang Gyoon .
IEEE ACCESS, 2022, 10 :109366-109384
[32]   Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection [J].
Wang, Jianyu ;
Pan, Jianli ;
AlQerm, Ismail ;
Liu, Yuanni .
30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
[33]   Dataset of attacks on a live enterprise VoIP network for machine learning based intrusion detection and prevention systems [J].
Alvares, Christabelle ;
Dinesh, Dristi ;
Alvi, Syed ;
Gautam, Tannish ;
Hasib, Maheen ;
Raza, Ali .
COMPUTER NETWORKS, 2021, 197
[34]   Features vs. attacks: A comprehensive feature selection model for network based intrusion detection systems [J].
Onut, Iosif-Viorel ;
Ghorbani, Ali A. .
INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 :19-+
[35]   Generation-based parallel particle swarm optimization for adversarial text attacks [J].
Yang, Xinghao ;
Qi, Yupeng ;
Chen, Honglong ;
Liu, Baodi ;
Liu, Weifeng .
INFORMATION SCIENCES, 2023, 644
[36]   ROLDEF: RObust Layered DEFense for Intrusion Detection Against Adversarial Attacks [J].
Gungor, Onat ;
Rosing, Tajana ;
Alcsanli, Bans .
2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
[37]   FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning [J].
Li, Zeyi ;
Wang, Pan ;
Wang, Zixuan ;
Zhan, De-chuan .
CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) :58-71
[38]   An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection [J].
Vitorino, Joao ;
Silva, Miguel ;
Maia, Eva ;
Praca, Isabel .
FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 :3-17
[39]   Poisoning the Well: Adversarial Poisoning on ML-Based Software-Defined Network Intrusion Detection Systems [J].
Das, Tapadhir ;
Shukla, Raj Mani ;
Sengupta, Shamik .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2025, 12 (01) :252-262
[40]   On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks [J].
Diaz-Verdejo, Jesus ;
Munoz-Calle, Javier ;
Estepa Alonso, Antonio ;
Estepa Alonso, Rafael ;
Madinabeitia, German .
APPLIED SCIENCES-BASEL, 2022, 12 (02)