Classification of Adversarial Attacks Using Ensemble Clustering Approach

被引:0
作者
Tatongjai, Pongsakorn [1 ]
Boongoen, Tossapon [2 ]
Iam-On, Natthakan [2 ]
Naik, Nitin [3 ]
Yang, Longzhi [4 ]
机构
[1] Mae Fah Luang Univ, Ctr Excellence AI & Emerging Technol, Sch IT, Chiang Rai, Thailand
[2] Aberystwyth Univ, Dept Comp Sci, Aberystwyth, Wales
[3] Aston Univ, Sch Informat & Digital Engn, Birmingham, W Midlands, England
[4] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne, Tyne & Wear, England
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Intrusion detection; adversarial attack; machine learning; feature transformation; ensemble clustering; ARTIFICIAL BEE COLONY; INTRUSION-DETECTION; GENERATION; SECURITY; TAXONOMY;
D O I
10.32604/cmc.2023.024858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more business transactions and information services have been implemented via communication networks, both personal and organization assets encounter a higher risk of attacks. To safeguard these, a perimeter defence like NIDS (network-based intrusion detection system) can be effective for known intrusions. There has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks, where obfuscation techniques are applied to disguise patterns of intrusive traffics. The current research focuses on non-payload connections at the TCP (transmission control protocol) stack level that is applicable to different network applications. In contrary to the wrapper method introduced with the benchmark dataset, three new filter models are proposed to transform the feature space without knowledge of class labels. These ECT (ensemble clustering based transformation) techniques, i.e., ECT-Subspace, ECT-Noise and ECT-Combined, are developed using the concept of ensemble clustering and three different ensemble generation strategies, i.e., random feature subspace, feature noise injection and their combinations. Based on the empirical study with published dataset and four classification algorithms, new models usually outperform that original wrapper and other filter alternatives found in the literature. This is similarly summarized from the first experiment with basic classification of legitimate and direct attacks, and the second that focuses on recognizing obfuscated intrusions. In addition, analysis of algorithmic parameters, i.e., ensemble size and level of noise, is provided as a guideline for a practical use.
引用
收藏
页码:2479 / 2498
页数:20
相关论文
共 50 条
  • [41] Multiloss Adversarial Attacks for Multimodal Remote Sensing Image Classification
    Hu, Qi
    Shen, Zhidong
    Sha, Zongyao
    Tan, Weijie
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2024, 62 : 1 - 13
  • [42] Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem
    Chutipon Pimsarn
    Tossapon Boongoen
    Natthakan Iam-On
    Nitin Naik
    Longzhi Yang
    Complex & Intelligent Systems, 2022, 8 : 4863 - 4880
  • [43] POSTER: Towards Polyvalent Adversarial Attacks on URL Classification Engines
    Charmet, Fabien
    Tanuwidjaja, Harry C.
    Morikawa, Tomohiro
    Takahashi, Takeshi
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1246 - 1248
  • [44] Demodulation Scheme Against Phase Noise Using an Ensemble Clustering Approach
    Li, Yu
    Zhang, Jiaheng
    Xie, Ning
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 12938 - 12951
  • [45] Revisiting Adversarial Attacks on Graph Neural Networks for Graph Classification
    Wang, Xin
    Chang, Heng
    Xie, Beini
    Bian, Tian
    Zhou, Shiji
    Wang, Daixin
    Zhang, Zhiqiang
    Zhu, Wenwu
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (05) : 2166 - 2178
  • [46] Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors
    Apruzzese, Giovanni
    Colajanni, Michele
    Marchetti, Mirco
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 193 - 200
  • [47] Adversarial Attacks on Regression Systems via Gradient Optimization
    Kong, Xiangyin
    Ge, Zhiqiang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (12): : 7827 - 7839
  • [48] Adversarial Attacks for Intrusion Detection Based on Bus Traffic
    He, Daojing
    Dai, Jiayu
    Liu, Xiaoxia
    Zhu, Shanshan
    Chan, Sammy
    Guizani, Mohsen
    IEEE NETWORK, 2022, 36 (04): : 203 - 209
  • [49] A Robust Malware Detection Approach for Android System against Adversarial Example Attacks
    Li, Wenjia
    Bala, Neha
    Ahmar, Aemun
    Tovar, Fernanda
    Battu, Arpit
    Bambarkar, Prachi
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 360 - 365
  • [50] Detecting web attacks using random undersampling and ensemble learners
    Richard Zuech
    John Hancock
    Taghi M. Khoshgoftaar
    Journal of Big Data, 8