SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection

被引:13
作者
Vitorino, Joao [1 ]
Praca, Isabel [1 ]
Maia, Eva [1 ]
机构
[1] Polytech Porto ISEP IPP, Sch Engn, Res Grp Intelligent Engn & Comp Adv Innovat & Dev, P-4249015 Porto, Portugal
关键词
Realistic adversarial examples; Adversarial robustness; Cybersecurity; Intrusion detection; Machine learning; ROBUSTNESS; SYSTEMS;
D O I
10.1016/j.cose.2023.103433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) can be incredibly valuable to automate anomaly detection and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is performed. However, despite the benefits of ML models, they are highly susceptible to adversarial cyber-attack examples specifically crafted to exploit them. A wide range of adversarial attacks have been created and researchers have worked on various defense strategies to safeguard ML models, but most were not intended for the specific constraints of a communication network and its communication protocols, so they may lead to unrealistic examples in the NID domain. This Systematization of Knowledge (SoK) consolidates and summarizes the state-of-the-art adversarial learning approaches that can generate realistic examples and could be used in ML development and deployment scenarios with real network traffic flows. This SoK also describes the open challenges regarding the use of adversarial ML in the NID domain, defines the fundamental properties that are required for an adversarial example to be realistic, and provides guidelines for researchers to ensure that their experiments are adequate for a real communication network.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks
    Nathaniel, Dhinakaran
    Soosai, Anto
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2023, 23 (04) : 81 - 88
  • [32] Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms
    Zhang, Chaoyun
    Costa-Perez, Xavier
    Patras, Paul
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (03) : 1294 - 1311
  • [33] State of the art on adversarial attacks and defenses in graphs
    Zhengli Zhai
    Penghui Li
    Shu Feng
    Neural Computing and Applications, 2023, 35 : 18851 - 18872
  • [34] State of the art on adversarial attacks and defenses in graphs
    Zhai, Zhengli
    Li, Penghui
    Feng, Shu
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (26) : 18851 - 18872
  • [35] Adversarial Attacks and Defenses: Frontiers, Advances and Practice
    Xu, Han
    Li, Yaxin
    Jin, Wei
    Tang, Jiliang
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 3541 - 3542
  • [36] Enhancing network intrusion detection classifiers using supervised adversarial training
    Yin, Chuanlong
    Zhu, Yuefei
    Liu, Shengli
    Fei, Jinlong
    Zhang, Hetong
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (09) : 6690 - 6719
  • [37] Intelligent Connected Vehicle Security: Threats, Attacks and Defenses*
    Wang, Xifeng
    Sun, Limin
    Wang, Chao
    Zhu, Hongsong
    Zhao, Lian
    Yang, Shujie
    Xu, Changqiao
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2023, 39 (06) : 1265 - 1303
  • [38] Enhancing network intrusion detection classifiers using supervised adversarial training
    Chuanlong Yin
    Yuefei Zhu
    Shengli Liu
    Jinlong Fei
    Hetong Zhang
    The Journal of Supercomputing, 2020, 76 : 6690 - 6719
  • [39] Enhancing Intrusion Detection through Deep Learning and Generative Adversarial Network
    Rahman, Md Habibur
    Martinez, Leo, III
    Mishra, Avdesh
    Nijim, Mais
    Goyal, Ayush
    Hicks, David
    4TH INTERDISCIPLINARY CONFERENCE ON ELECTRICS AND COMPUTER, INTCEC 2024, 2024,
  • [40] Network Intrusion Detection System based on Generative Adversarial Network for Attack Detection
    Das, Abhijit
    Balakrishnan, S. G.
    Pramod
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 757 - 766