Black-box attacks against log anomaly detection with adversarial examples

被引:16
作者
Lu, Siyang [1 ]
Wang, Mingquan [2 ]
Wang, Dongdong [3 ]
Wei, Xiang [2 ]
Xiao, Sizhe [4 ]
Wang, Zhiwei [2 ]
Han, Ningning [1 ]
Wang, Liqiang [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[2] Beijing Jiaotong Univ, Sch Software Engn, Beijing, Peoples R China
[3] Univ Cent Florida, Dept Comp Sci, Orlando, FL USA
[4] Beijing Res Inst Automat Machinery Ind, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Log analysis; Big data; Anomalous detection; Deep learning;
D O I
10.1016/j.ins.2022.11.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep neural networks (DNNs) have been widely employed to solve log anomaly detection and outperform a range of conventional methods. They have attained such striking success because they can usually explore and extract semantic information from a large volume of log data, which helps to infer complex log anomaly patterns more accurately. Despite its success in generalization accuracy, this data-driven approach can still suffer from a high vulnerability to adversarial attacks, which severely limits its practical use. To address this issue, several studies have proposed anomaly detectors to equip neural networks to improve their robustness. These anomaly detectors are built based on effective adversarial attack methods. Therefore, effective adversarial attack approaches are important for devel-oping more efficient anomaly detectors, thereby improving neural network robustness. In this study, we propose two strong and effective black-box attackers, an attention-based and a gradient-based attacker, to defeat three target systems: MLP, AutoEncoder, and DeepLog.Our approach facilitates the generation of more effective adversarial examples with the help of the analysis of vulnerable logkeys. The proposed attention-based attacker leverages attention weights to achieve vulnerable logkeys and derive adversarial examples, which are implemented using our previously developed attention-based convolutional neural network model. The proposed gradient-based attacker calculates gradients based on potential vulnerable logkeys to seek an optimal adversarial sample. The experimental results showed that these two approaches significantly outperformed the state-of-the-art attacker model log anomaly mask (LAM). In particular, owing to its optimization, the proposed gradient-based attacker approach can significantly increase the misclassification rate on three target models, yields a 70% successful attack rate on DeepLog and greatly exceeds the baseline by 52%.(c) 2022 The Author(s). Published by Elsevier Inc. This is an open access article under the CCBY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:249 / 262
页数:14
相关论文
共 41 条
[1]  
Audet Charles, 2000, 8 S MULTIDISCIPLINAR, P4891
[2]  
Bargiela A., 2022, Handbook on Computer Learning and Intelligence, V2, P97
[3]   Analysis Methods in Neural Language Processing: A Survey [J].
Belinkov, Yonatan ;
Glass, James .
TRANSACTIONS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, 2019, 7 :49-72
[4]  
Borghesi A, 2019, AAAI CONF ARTIF INTE, P9428
[5]   Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection [J].
Brown, Andy ;
Tuor, Aaron ;
Hutchinson, Brian ;
Nichols, Nicole .
PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING FOR COMPUTING SYSTEMS (MLCS 2018), 2018,
[6]  
Casolare R., 2021, J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl., V12, P44
[7]  
Cheng MH, 2020, AAAI CONF ARTIF INTE, V34, P3601
[8]  
Devlin J, 2019, Arxiv, DOI [arXiv:1810.04805, 10.48550/arxiv.1810.04805]
[9]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[10]  
Ebrahimi J, 2018, Arxiv, DOI arXiv:1712.06751