Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems

被引:13
|
作者
Debicha, Islam [1 ,2 ]
Cochez, Benjamin [1 ]
Kenaza, Tayeb [3 ]
Debatty, Thibault [2 ]
Dricot, Jean -Michel [1 ]
Mees, Wim [2 ]
机构
[1] Univ Libre Bruxelles, Cybersecur Res Ctr, B-1000 Brussels, Belgium
[2] Royal Mil Acad, Cyber Def Lab, B-1000 Brussels, Belgium
[3] Ecole Mil Polytech, Comp Secur Lab, Algiers, Algeria
关键词
Intrusion detection system; Botnet attacks; Machine learning; Evasion attacks; Adversarial detection; ROBUSTNESS;
D O I
10.1016/j.cose.2023.103176
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the numerous advantages of machine learning (ML) algorithms, many applications now incorpo-rate them. However, many studies in the field of image classification have shown that MLs can be fooled by a variety of adversarial attacks. These attacks take advantage of ML algorithms' inherent vulnerability. This raises many questions in the cybersecurity field, where a growing number of researchers are recently investigating the feasibility of such attacks against machine learning-based security systems, such as in-trusion detection systems. The majority of this research demonstrates that it is possible to fool a model using features extracted from a raw data source, but it does not take into account the real implemen-tation of such attacks, i.e., the reverse transformation from theory to practice. The real implementation of these adversarial attacks would be influenced by various constraints that would make their execution more difficult. As a result, the purpose of this study was to investigate the actual feasibility of adversarial attacks, specifically evasion attacks, against network-based intrusion detection systems (NIDS), demon-strating that it is entirely possible to fool these ML-based IDSs using our proposed adversarial algorithm while assuming as many constraints as possible in a black-box setting. In addition, since it is critical to design defense mechanisms to protect ML-based IDSs against such attacks, a defensive scheme is pre-sented. Realistic botnet traffic traces are used to assess this work. Our goal is to create adversarial botnet traffic that can avoid detection while still performing all of its intended malicious functionality.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
    Mudassir, Mohammed
    Unal, Devrim
    Hammoudeh, Mohammad
    Azzedin, Farag
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [32] A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks
    Nathaniel, Dhinakaran
    Soosai, Anto
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2023, 23 (04) : 81 - 88
  • [33] Reflective Adversarial Attacks against Pedestrian Detection Systems for Vehicles at Night
    Chen, Yuanwan
    Wu, Yalun
    Cui, Xiaoshu
    Li, Qiong
    Liu, Jiqiang
    Niu, Wenjia
    SYMMETRY-BASEL, 2024, 16 (10):
  • [34] Advances in Adversarial Attacks and Defenses in Intrusion Detection System: A Survey
    Mbow, Mariama
    Sakurai, Kouichi
    Koide, Hiroshi
    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 196 - 212
  • [35] On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective
    Wang, Minxiao
    Yang, Ning
    Gunasinghe, Dulaj H.
    Weng, Ning
    COMPUTERS, 2023, 12 (10)
  • [36] An Intrusion Detection System Against Malicious Attacks on the Communication Network of Driverless Cars
    Alheeti, Khattab M. Ali
    Gruebler, Anna
    McDonald-Maier, Klaus D.
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 916 - 921
  • [37] Approach to Detecting Attacks against Machine Learning Systems with a Generative Adversarial Network
    Kotenko, I. V.
    Saenko, I. B.
    Lauta, O. S.
    Vasilev, N. A.
    Sadovnikov, V. E.
    PATTERN RECOGNITION AND IMAGE ANALYSIS, 2024, 34 (03) : 589 - 596
  • [38] On the robustness of skeleton detection against adversarial attacks
    Bai, Xiuxiu
    Yang, Ming
    Liu, Zhe
    NEURAL NETWORKS, 2020, 132 : 416 - 427
  • [39] Adversarial Sampling Attacks Against Phishing Detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Charles
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 83 - 101
  • [40] Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning
    Sauka, Kudzai
    Shin, Gun-Yoo
    Kim, Dong-Wook
    Han, Myung-Mook
    APPLIED SCIENCES-BASEL, 2022, 12 (13):