Classification of Adversarial Attacks Using Ensemble Clustering Approach

被引:0
|
作者
Tatongjai, Pongsakorn [1 ]
Boongoen, Tossapon [2 ]
Iam-On, Natthakan [2 ]
Naik, Nitin [3 ]
Yang, Longzhi [4 ]
机构
[1] Mae Fah Luang Univ, Ctr Excellence AI & Emerging Technol, Sch IT, Chiang Rai, Thailand
[2] Aberystwyth Univ, Dept Comp Sci, Aberystwyth, Wales
[3] Aston Univ, Sch Informat & Digital Engn, Birmingham, W Midlands, England
[4] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne, Tyne & Wear, England
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Intrusion detection; adversarial attack; machine learning; feature transformation; ensemble clustering; ARTIFICIAL BEE COLONY; INTRUSION-DETECTION; GENERATION; SECURITY; TAXONOMY;
D O I
10.32604/cmc.2023.024858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more business transactions and information services have been implemented via communication networks, both personal and organization assets encounter a higher risk of attacks. To safeguard these, a perimeter defence like NIDS (network-based intrusion detection system) can be effective for known intrusions. There has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks, where obfuscation techniques are applied to disguise patterns of intrusive traffics. The current research focuses on non-payload connections at the TCP (transmission control protocol) stack level that is applicable to different network applications. In contrary to the wrapper method introduced with the benchmark dataset, three new filter models are proposed to transform the feature space without knowledge of class labels. These ECT (ensemble clustering based transformation) techniques, i.e., ECT-Subspace, ECT-Noise and ECT-Combined, are developed using the concept of ensemble clustering and three different ensemble generation strategies, i.e., random feature subspace, feature noise injection and their combinations. Based on the empirical study with published dataset and four classification algorithms, new models usually outperform that original wrapper and other filter alternatives found in the literature. This is similarly summarized from the first experiment with basic classification of legitimate and direct attacks, and the second that focuses on recognizing obfuscated intrusions. In addition, analysis of algorithmic parameters, i.e., ensemble size and level of noise, is provided as a guideline for a practical use.
引用
收藏
页码:2479 / 2498
页数:20
相关论文
共 50 条
  • [1] A Robust Approach for Securing Audio Classification Against Adversarial Attacks
    Esmaeilpour, Mohammad
    Cardinal, Patrick
    Koerich, Alessandro
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2147 - 2159
  • [2] DeepIris: An ensemble approach to defending Iris recognition classifiers against Adversarial Attacks
    Tamizhiniyan, S. R.
    Ojha, Aman
    Meenakshi, K.
    Maragatham, G.
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [3] Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems
    Chen, Zesheng
    Li, Jack
    Chen, Chao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 32645 - 32655
  • [4] Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem
    Pimsarn, Chutipon
    Boongoen, Tossapon
    Iam-On, Natthakan
    Naik, Nitin
    Yang, Longzhi
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (06) : 4863 - 4880
  • [5] Detecting IoT Attacks Using an Ensemble Machine Learning Model
    Tomer, Vikas
    Sharma, Sachin
    FUTURE INTERNET, 2022, 14 (04):
  • [6] Adversarial Attacks and Defense on an Aircraft Classification Model Using a Generative Adversarial Network
    Colter, Jamison
    Kinnison, Matthew
    Henderson, Alex
    Harbour, Steven
    2023 IEEE/AIAA 42ND DIGITAL AVIONICS SYSTEMS CONFERENCE, DASC, 2023,
  • [7] A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks
    Nathaniel, Dhinakaran
    Soosai, Anto
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2023, 23 (04) : 81 - 88
  • [8] Evaluating Pretrained Deep Learning Models for Image Classification Against Individual and Ensemble Adversarial Attacks
    Rahman, Mafizur
    Roy, Prosenjit
    Frizell, Sherri S.
    Qian, Lijun
    IEEE ACCESS, 2025, 13 : 35230 - 35242
  • [9] Adversarial Attacks on Medical Image Classification
    Tsai, Min-Jen
    Lin, Ping-Yi
    Lee, Ming-En
    CANCERS, 2023, 15 (17)
  • [10] An Ensemble Edge Computing Approach for SD-IoT security Using Ensemble of Feature Selection Methods and Classification
    Chauhan, Pinkey
    Atulkar, Mithilesh
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (09) : 12953 - 12974