Classification of Adversarial Attacks Using Ensemble Clustering Approach

被引:0
|
作者
Tatongjai, Pongsakorn [1 ]
Boongoen, Tossapon [2 ]
Iam-On, Natthakan [2 ]
Naik, Nitin [3 ]
Yang, Longzhi [4 ]
机构
[1] Mae Fah Luang Univ, Ctr Excellence AI & Emerging Technol, Sch IT, Chiang Rai, Thailand
[2] Aberystwyth Univ, Dept Comp Sci, Aberystwyth, Wales
[3] Aston Univ, Sch Informat & Digital Engn, Birmingham, W Midlands, England
[4] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne, Tyne & Wear, England
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Intrusion detection; adversarial attack; machine learning; feature transformation; ensemble clustering; ARTIFICIAL BEE COLONY; INTRUSION-DETECTION; GENERATION; SECURITY; TAXONOMY;
D O I
10.32604/cmc.2023.024858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more business transactions and information services have been implemented via communication networks, both personal and organization assets encounter a higher risk of attacks. To safeguard these, a perimeter defence like NIDS (network-based intrusion detection system) can be effective for known intrusions. There has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks, where obfuscation techniques are applied to disguise patterns of intrusive traffics. The current research focuses on non-payload connections at the TCP (transmission control protocol) stack level that is applicable to different network applications. In contrary to the wrapper method introduced with the benchmark dataset, three new filter models are proposed to transform the feature space without knowledge of class labels. These ECT (ensemble clustering based transformation) techniques, i.e., ECT-Subspace, ECT-Noise and ECT-Combined, are developed using the concept of ensemble clustering and three different ensemble generation strategies, i.e., random feature subspace, feature noise injection and their combinations. Based on the empirical study with published dataset and four classification algorithms, new models usually outperform that original wrapper and other filter alternatives found in the literature. This is similarly summarized from the first experiment with basic classification of legitimate and direct attacks, and the second that focuses on recognizing obfuscated intrusions. In addition, analysis of algorithmic parameters, i.e., ensemble size and level of noise, is provided as a guideline for a practical use.
引用
收藏
页码:2479 / 2498
页数:20
相关论文
共 50 条
  • [21] FGMD: A robust detector against adversarial attacks in the IoT network
    Jiang, Hongling
    Lin, Jinzhi
    Kang, Haiyan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 132 : 194 - 210
  • [22] ENSEMBLE ADVERSARIAL TRAINING BASED DEFENSE AGAINST ADVERSARIAL ATTACKS FOR MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEM
    Haroon, M. S.
    Ali, H. M.
    NEURAL NETWORK WORLD, 2023, 33 (05) : 317 - 336
  • [23] Resilience of GANs against Adversarial Attacks
    Rudayskyy, Kyrylo
    Miri, Ali
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 390 - 397
  • [24] Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables
    Adeke, James Msughter
    Liu, Guangjie
    Zhao, Junjie
    Wu, Nannan
    Bashir, Hafsat Muhammad
    Davoli, Franco
    FUTURE INTERNET, 2023, 15 (12)
  • [25] Geometric Stability Classification: Datasets, Metamodels, and Adversarial Attacks
    Lejeune, Emma
    COMPUTER-AIDED DESIGN, 2021, 131
  • [26] SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks
    O'Meara, John William
    Elsayed, Mahmoud Said
    Saber, Takfarinas
    Jurcut, Anca Delia
    2022 32ND INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2022, : 28 - 35
  • [27] Adversarial Deep Learning: A Survey on Adversarial Attacks and Defense Mechanisms on Image Classification
    Khamaiseh, Samer Y.
    Bagagem, Derek
    Al-Alaj, Abdullah
    Mancino, Mathew
    Alomari, Hakam W.
    IEEE ACCESS, 2022, 10 : 102266 - 102291
  • [28] A deep learning approach with Bayesian optimization and ensemble classifiers for detecting denial of service attacks
    Gormez, Yasin
    Aydin, Zafer
    Karademir, Ramazan
    Gungor, Vehbi C.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
  • [29] An ensemble method for feature selection and an integrated approach for mitigation of distributed denial of service attacks
    Chanu, Usham Sanjota
    Singh, Khundrakpam Johnson
    Chanu, Yambem Jina
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (13)
  • [30] ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions
    Lin, Ying-Dar
    Pratama, Jehoshua-Hanky
    Sudyana, Didik
    Lai, Yuan-Cheng
    Hwang, Ren-Hung
    Lin, Po-Ching
    Lin, Hsuan-Yu
    Lee, Wei-Bin
    Chiang, Chen-Kuo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71