SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection

被引:13
作者
Vitorino, Joao [1 ]
Praca, Isabel [1 ]
Maia, Eva [1 ]
机构
[1] Polytech Porto ISEP IPP, Sch Engn, Res Grp Intelligent Engn & Comp Adv Innovat & Dev, P-4249015 Porto, Portugal
关键词
Realistic adversarial examples; Adversarial robustness; Cybersecurity; Intrusion detection; Machine learning; ROBUSTNESS; SYSTEMS;
D O I
10.1016/j.cose.2023.103433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) can be incredibly valuable to automate anomaly detection and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is performed. However, despite the benefits of ML models, they are highly susceptible to adversarial cyber-attack examples specifically crafted to exploit them. A wide range of adversarial attacks have been created and researchers have worked on various defense strategies to safeguard ML models, but most were not intended for the specific constraints of a communication network and its communication protocols, so they may lead to unrealistic examples in the NID domain. This Systematization of Knowledge (SoK) consolidates and summarizes the state-of-the-art adversarial learning approaches that can generate realistic examples and could be used in ML development and deployment scenarios with real network traffic flows. This SoK also describes the open challenges regarding the use of adversarial ML in the NID domain, defines the fundamental properties that are required for an adversarial example to be realistic, and provides guidelines for researchers to ensure that their experiments are adequate for a real communication network.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Research on Intelligent Detection of Intrusion Data in Network
    Zhu, Guangjie
    Yao, Honglei
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 5 - 10
  • [42] SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses
    Sun, Ruimin
    Mera, Alejandro
    Lu, Long
    Choffnes, David
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 385 - 402
  • [43] RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks
    Sarikaya, Alper
    Kilic, Banu Gunel
    Demirci, Mehmet
    COMPUTERS & SECURITY, 2023, 135
  • [44] Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems
    Son, Bui Duc
    Hoa, Nguyen Tien
    Chien, Trinh Van
    Khalid, Waqas
    Ferrag, Mohamed Amine
    Choi, Wan
    Debbah, Merouane
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11): : 19168 - 19187
  • [45] Selection of Effective Network Parameters in Attacks for Intrusion Detection
    Zargar, Gholam Reza
    Kabiri, Peyman
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2010, 6171 : 643 - +
  • [46] Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
    Pozdnyakov, Vitaliy
    Kovalenko, Aleksandr
    Makarov, Ilya
    Drobyshevskiy, Mikhail
    Lukyanov, Kirill
    IEEE OPEN JOURNAL OF THE INDUSTRIAL ELECTRONICS SOCIETY, 2024, 5 : 428 - 440
  • [47] Generative Adversarial Attacks Against Intrusion Detection Systems Using Active Learning
    Shu, Dule
    Leslie, Nandi O.
    Kamhoua, Charles A.
    Tucker, Conrad S.
    PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020, 2020, : 1 - 6
  • [48] Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
    Ibitoye, Olakunle
    Shafiq, Omair
    Matrawy, Ashraf
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [49] A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks
    Alslman, Yasmeen
    Alkasassbeh, Mouhammd
    Almseidin, Mohammad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 4179 - 4195
  • [50] A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks
    Yasmeen Alslman
    Mouhammd Alkasassbeh
    Mohammad Almseidin
    Arabian Journal for Science and Engineering, 2024, 49 : 4179 - 4195