Classification of Adversarial Attacks Using Ensemble Clustering Approach

被引:0
|
作者
Tatongjai, Pongsakorn [1 ]
Boongoen, Tossapon [2 ]
Iam-On, Natthakan [2 ]
Naik, Nitin [3 ]
Yang, Longzhi [4 ]
机构
[1] Mae Fah Luang Univ, Ctr Excellence AI & Emerging Technol, Sch IT, Chiang Rai, Thailand
[2] Aberystwyth Univ, Dept Comp Sci, Aberystwyth, Wales
[3] Aston Univ, Sch Informat & Digital Engn, Birmingham, W Midlands, England
[4] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne, Tyne & Wear, England
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Intrusion detection; adversarial attack; machine learning; feature transformation; ensemble clustering; ARTIFICIAL BEE COLONY; INTRUSION-DETECTION; GENERATION; SECURITY; TAXONOMY;
D O I
10.32604/cmc.2023.024858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more business transactions and information services have been implemented via communication networks, both personal and organization assets encounter a higher risk of attacks. To safeguard these, a perimeter defence like NIDS (network-based intrusion detection system) can be effective for known intrusions. There has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks, where obfuscation techniques are applied to disguise patterns of intrusive traffics. The current research focuses on non-payload connections at the TCP (transmission control protocol) stack level that is applicable to different network applications. In contrary to the wrapper method introduced with the benchmark dataset, three new filter models are proposed to transform the feature space without knowledge of class labels. These ECT (ensemble clustering based transformation) techniques, i.e., ECT-Subspace, ECT-Noise and ECT-Combined, are developed using the concept of ensemble clustering and three different ensemble generation strategies, i.e., random feature subspace, feature noise injection and their combinations. Based on the empirical study with published dataset and four classification algorithms, new models usually outperform that original wrapper and other filter alternatives found in the literature. This is similarly summarized from the first experiment with basic classification of legitimate and direct attacks, and the second that focuses on recognizing obfuscated intrusions. In addition, analysis of algorithmic parameters, i.e., ensemble size and level of noise, is provided as a guideline for a practical use.
引用
收藏
页码:2479 / 2498
页数:20
相关论文
共 50 条
  • [31] An Ensemble Classification Approach Using Improvised Attribute Selection
    Memon, Muhammad Qasim
    Qu, Shengquan
    Lu, Yu
    Memon, Aasma
    Memon, Abdul Rehman
    2021 22ND INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2021, : 606 - 610
  • [32] Entropy Clustering Approach for Improving Forecasting in DDoS Attacks
    Olabelurin, Abimbola
    Veluru, Suresh
    Healing, Alex
    Rajarajan, Muttukrishnan
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 315 - 320
  • [33] An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JS']JSMA) Algorithm
    Qureshi, Ayyaz Ul Haq
    Larijani, Hadi
    Yousefi, Mehdi
    Adeel, Ahsan
    Mtetwa, Nhamoinesu
    COMPUTERS, 2020, 9 (03) : 1 - 14
  • [34] Hoplite Antivirus for Adversarial Attacks: A Theoretical Approach
    Nikolakopoulos, Anastasios
    Marinakis, Achilleas
    Moulos, Vrettos
    Varvarigou, Theodora
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES (WEBIST), 2021, : 585 - 592
  • [35] Increasing Robustness against Adversarial Attacks through Ensemble of Approximate Multipliers
    Atoofian, Ehsan
    2022 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2022, : 148 - 155
  • [36] The Impact of Adversarial Attacks on Federated Learning: A Survey
    Kumar, Kummari Naveen
    Mohan, Chalavadi Krishna
    Cenkeramaddi, Linga Reddy
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (05) : 2672 - 2691
  • [37] A random forest algorithm under the ensemble approach for feature selection and classification
    Kharwar, Ankit
    Thakor, Devendra
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (04) : 426 - 447
  • [38] Neural Networks Ensemble Approach for Detecting Attacks in Computer Networks
    Bukhtoyarov, Vladimir
    Semenkin, Eugene
    2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [39] Secure Indoor Localization Against Adversarial Attacks Using DCGAN
    Yan, Qingli
    Xiong, Wang
    Wang, Hui-Ming
    IEEE COMMUNICATIONS LETTERS, 2025, 29 (01) : 130 - 134
  • [40] Text Clustering using Ensemble Clustering Technique
    Mateen, Muhammad
    Wen, Junhao
    Song, Sun
    Hassan, Mehdi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (09) : 185 - 190