ENSEMBLE ADVERSARIAL TRAINING BASED DEFENSE AGAINST ADVERSARIAL ATTACKS FOR MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEM

被引:0
|
作者
Haroon, M. S. [1 ]
Ali, H. M. [1 ]
机构
[1] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol SZA, Dept Comp Sci, Block 5 Clifton, Karachi 75600, Pakistan
关键词
adversarial attack; adversarial training; ensemble adversarial training; intrusion detection system; machine learning;
D O I
10.14311/NNW.2023.33.018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a defence mechanism is proposed against adversarial attacks. The defence is based on an ensemble classifier that is adversarially trained. This is accomplished by generating adversarial attacks from four different attack methods, i.e., Jacobian-based saliency map attack (JSMA), projected gradient descent (PGD), momentum iterative method (MIM), and fast gradient signed method (FGSM). The adversarial examples are used to identify the robust machine-learning algorithms which eventually participate in the ensemble. The adversarial attacks are divided into seen and unseen attacks. To validate our work, the experiments are conducted using NSLKDD, UNSW-NB15 and CICIDS17 datasets. Grid search for the ensemble is used to optimise results. The parameter used for performance evaluations is accuracy, F1 score and AUC score. It is shown that an adversarially trained ensemble classifier produces better results.
引用
收藏
页码:317 / 336
页数:20
相关论文
共 50 条
  • [21] Fortifying Machine Learning-Powered Intrusion Detection: A Defense Strategy Against Adversarial Black-Box Attacks
    Pujari, Medha
    Sun, Weiqing
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 5, ICICT 2024, 2024, 1000 : 655 - 671
  • [22] Generating practical adversarial examples against learning-based network intrusion detection systems
    Kumar, Vivek
    Kumar, Kamal
    Singh, Maheep
    ANNALS OF TELECOMMUNICATIONS, 2025, 80 (3-4) : 209 - 226
  • [23] Learning-Based Robust Anomaly Detection in the Presence of Adversarial Attacks
    Zhong, Chen
    Gursoy, M. Cenk
    Velipasalar, Senem
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1206 - 1211
  • [24] Defense Against Adversarial Attacks Using Topology Aligning Adversarial Training
    Kuang, Huafeng
    Liu, Hong
    Lin, Xianming
    Ji, Rongrong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3659 - 3673
  • [25] Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems
    Chen, Jiming
    Gao, Xiangshan
    Deng, Ruilong
    He, Yang
    Fang, Chongrong
    Cheng, Peng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1810 - 1825
  • [26] Stealthy Adversarial Attacks on Machine Learning-Based Classifiers of Wireless Signals
    Zhang, Wenhan
    Krunz, Marwan
    Ditzler, Gregory
    IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2 : 261 - 279
  • [27] Adversarial Attacks for Intrusion Detection Based on Bus Traffic
    He, Daojing
    Dai, Jiayu
    Liu, Xiaoxia
    Zhu, Shanshan
    Chan, Sammy
    Guizani, Mohsen
    IEEE NETWORK, 2022, 36 (04): : 203 - 209
  • [28] RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks
    Sarikaya, Alper
    Kilic, Banu Gunel
    Demirci, Mehmet
    COMPUTERS & SECURITY, 2023, 135
  • [29] A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks
    Nathaniel, Dhinakaran
    Soosai, Anto
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2023, 23 (04) : 81 - 88
  • [30] A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system
    Yuan, Xinwei
    Han, Shu
    Huang, Wei
    Ye, Hongliang
    Kong, Xianglong
    Zhang, Fan
    COMPUTERS & SECURITY, 2024, 137