ENSEMBLE ADVERSARIAL TRAINING BASED DEFENSE AGAINST ADVERSARIAL ATTACKS FOR MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEM

被引:0
作者
Haroon, M. S. [1 ]
Ali, H. M. [1 ]
机构
[1] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol SZA, Dept Comp Sci, Block 5 Clifton, Karachi 75600, Pakistan
关键词
adversarial attack; adversarial training; ensemble adversarial training; intrusion detection system; machine learning;
D O I
10.14311/NNW.2023.33.018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a defence mechanism is proposed against adversarial attacks. The defence is based on an ensemble classifier that is adversarially trained. This is accomplished by generating adversarial attacks from four different attack methods, i.e., Jacobian-based saliency map attack (JSMA), projected gradient descent (PGD), momentum iterative method (MIM), and fast gradient signed method (FGSM). The adversarial examples are used to identify the robust machine-learning algorithms which eventually participate in the ensemble. The adversarial attacks are divided into seen and unseen attacks. To validate our work, the experiments are conducted using NSLKDD, UNSW-NB15 and CICIDS17 datasets. Grid search for the ensemble is used to optimise results. The parameter used for performance evaluations is accuracy, F1 score and AUC score. It is shown that an adversarially trained ensemble classifier produces better results.
引用
收藏
页码:317 / 336
页数:20
相关论文
共 33 条
  • [1] Energy-efficient edge based real-time healthcare support system
    Abirami, S.
    Chitra, P.
    [J]. DIGITAL TWIN PARADIGM FOR SMARTER SYSTEMS AND ENVIRONMENTS: THE INDUSTRY USE CASES, 2020, 117 : 339 - 368
  • [2] X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things
    Al-Hawawreh, Muna
    Sitnikova, Elena
    Aboutorab, Neda
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3962 - 3977
  • [3] Adversarial machine learning in Network Intrusion Detection Systems
    Alhajjar, Elie
    Maxwell, Paul
    Bastian, Nathaniel
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
  • [4] Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems
    Anthi, Eirini
    Williams, Lowri
    Rhode, Matilda
    Burnap, Pete
    Wedgbury, Adam
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [5] Canadian Institute for Cybersecurity & University of New Brunswick, 2009, NSL-KDD Datasets Research Canadian Institute for Cybersecurity
  • [6] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [7] Carlini Nicholas, 2016, ARXIV160704311
  • [8] Fooling intrusion detection systems using adversarially autoencoder
    Chen, Junjun
    Wu, Di
    Zhao, Ying
    Sharma, Nabin
    Blumenstein, Michael
    Yu, Shui
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (03) : 453 - 460
  • [9] Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
  • [10] Goodfellow Ian, 2015, 3 INT C LEARN REPR I