Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense

被引:35
作者
Alotaibi, Afnan [1 ]
Rassam, Murad A. [1 ,2 ]
机构
[1] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
[2] Taiz Univ, Fac Engn & Informat Technol, Taizi 6803, Yemen
关键词
adversarial machine learning; intrusion detection systems; adversarial attacks; machine learning; deep learning; network security; NETWORKS; SECURITY;
D O I
10.3390/fi15020062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks before they enter the system and classifying them as malicious activities. However, the IDS approaches have shortcomings in misclassifying novel attacks or adapting to emerging environments, affecting their accuracy and increasing false alarms. To solve this problem, researchers have recommended using machine learning approaches as engines for IDSs to increase their efficacy. Machine-learning techniques are supposed to automatically detect the main distinctions between normal and malicious data, even novel attacks, with high accuracy. However, carefully designed adversarial input perturbations during the training or testing phases can significantly affect their predictions and classifications. Adversarial machine learning (AML) poses many cybersecurity threats in numerous sectors that use machine-learning-based classification systems, such as deceiving IDS to misclassify network packets. Thus, this paper presents a survey of adversarial machine-learning strategies and defenses. It starts by highlighting various types of adversarial attacks that can affect the IDS and then presents the defense strategies to decrease or eliminate the influence of these attacks. Finally, the gaps in the existing literature and future research directions are presented.
引用
收藏
页数:34
相关论文
共 107 条
[51]   IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection [J].
Lin, Zilong ;
Shi, Yong ;
Xue, Zhi .
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT III, 2022, 13282 :79-91
[52]   ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks [J].
Liu, Guanxiong ;
Khalil, Issa ;
Khreishah, Abdallah .
2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, :64-75
[53]   Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey [J].
Liu, Hongyu ;
Lang, Bo .
APPLIED SCIENCES-BASEL, 2019, 9 (20)
[54]   Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review [J].
Martins, Nuno ;
Cruz, Jose Magalhaes ;
Cruz, Tiago ;
Abreu, Pedro Henriques .
IEEE ACCESS, 2020, 8 :35403-35419
[55]   Impact of artificial "Gummy" fingers on fingerprint systems [J].
Matsumoto, T ;
Matsumoto, H ;
Yamada, K ;
Hoshino, S .
OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES IV, 2002, 4677 :275-289
[56]  
McCarthy A, 2022, J CYBERSECUR 1, V2, P154, DOI [DOI 10.3390/JCP2010010, 10.3390/jcp2010010]
[57]  
Metzen Jan Hendrik, 2017, P INT C LEARN REPR I
[58]   DeepFool: a simple and accurate method to fool deep neural networks [J].
Moosavi-Dezfooli, Seyed-Mohsen ;
Fawzi, Alhussein ;
Frossard, Pascal .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :2574-2582
[59]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[60]  
Panigrahi R., 2018, INT J ENG TECHNOLOGY, V7, P479, DOI [10.14419/ijet.v7i3.24.22797, DOI 10.14419/IJET.V7I3.24.22797]