SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection

被引:12
|
作者
Vitorino, Joao [1 ]
Praca, Isabel [1 ]
Maia, Eva [1 ]
机构
[1] Polytech Porto ISEP IPP, Sch Engn, Res Grp Intelligent Engn & Comp Adv Innovat & Dev, P-4249015 Porto, Portugal
关键词
Realistic adversarial examples; Adversarial robustness; Cybersecurity; Intrusion detection; Machine learning; ROBUSTNESS; SYSTEMS;
D O I
10.1016/j.cose.2023.103433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) can be incredibly valuable to automate anomaly detection and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is performed. However, despite the benefits of ML models, they are highly susceptible to adversarial cyber-attack examples specifically crafted to exploit them. A wide range of adversarial attacks have been created and researchers have worked on various defense strategies to safeguard ML models, but most were not intended for the specific constraints of a communication network and its communication protocols, so they may lead to unrealistic examples in the NID domain. This Systematization of Knowledge (SoK) consolidates and summarizes the state-of-the-art adversarial learning approaches that can generate realistic examples and could be used in ML development and deployment scenarios with real network traffic flows. This SoK also describes the open challenges regarding the use of adversarial ML in the NID domain, defines the fundamental properties that are required for an adversarial example to be realistic, and provides guidelines for researchers to ensure that their experiments are adequate for a real communication network.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
    Debicha, Islam
    Bauwens, Richard
    Debatty, Thibault
    Dricot, Jean -Michel
    Kenaza, Tayeb
    Mees, Wim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 185 - 197
  • [22] XAI-driven Adversarial Attacks on Network Intrusion Detectors
    Okada, Satoshi
    Jmila, Houda
    Akashi, Kunio
    Mitsunaga, Takuho
    Sekiya, Yuji
    Takase, Hideki
    Blanc, Gregory
    Nakamura, Hiroshi
    PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024, 2024, : 65 - 73
  • [23] Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems
    Chale, Marc
    Cox, Bruce
    Weir, Jeffery
    Bastian, Nathaniel D.
    OPTIMIZATION LETTERS, 2024, 18 (09) : 2169 - 2188
  • [24] Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses
    Rathore, Hemant
    Samavedhi, Adithya
    Sahay, Sanjay K.
    Sewak, Mohit
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 37
  • [25] Domain Adversarial Neural Network-Based Intrusion Detection System for In-Vehicle Network Variant Attacks
    Wei, Jingwen
    Chen, Ye
    Lai, Yingxu
    Wang, Yuhang
    Zhang, Zhaoyi
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (11) : 2547 - 2551
  • [26] On the feasibility of adversarial machine learning in malware and network intrusion detection
    Venturi, Andrea
    Zanasi, Claudio
    2021 IEEE 20TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2021,
  • [27] Adversarial machine learning for network intrusion detection: A comparative study
    Jmila, Houda
    Ibn Khedher, Mohamed
    COMPUTER NETWORKS, 2022, 214
  • [28] A Recombination Generative Adversarial Network for Intrusion Detection
    Luo, Haoqi
    Wan, Liang
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2024, 34 (02) : 323 - 334
  • [29] Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks
    Miller, David J.
    Xiang, Zhen
    Kesidis, George
    PROCEEDINGS OF THE IEEE, 2020, 108 (03) : 402 - 433
  • [30] FGMD: A robust detector against adversarial attacks in the IoT network
    Jiang, Hongling
    Lin, Jinzhi
    Kang, Haiyan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 132 : 194 - 210