Black-box attacks against log anomaly detection with adversarial examples

被引:16
作者
Lu, Siyang [1 ]
Wang, Mingquan [2 ]
Wang, Dongdong [3 ]
Wei, Xiang [2 ]
Xiao, Sizhe [4 ]
Wang, Zhiwei [2 ]
Han, Ningning [1 ]
Wang, Liqiang [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[2] Beijing Jiaotong Univ, Sch Software Engn, Beijing, Peoples R China
[3] Univ Cent Florida, Dept Comp Sci, Orlando, FL USA
[4] Beijing Res Inst Automat Machinery Ind, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Log analysis; Big data; Anomalous detection; Deep learning;
D O I
10.1016/j.ins.2022.11.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep neural networks (DNNs) have been widely employed to solve log anomaly detection and outperform a range of conventional methods. They have attained such striking success because they can usually explore and extract semantic information from a large volume of log data, which helps to infer complex log anomaly patterns more accurately. Despite its success in generalization accuracy, this data-driven approach can still suffer from a high vulnerability to adversarial attacks, which severely limits its practical use. To address this issue, several studies have proposed anomaly detectors to equip neural networks to improve their robustness. These anomaly detectors are built based on effective adversarial attack methods. Therefore, effective adversarial attack approaches are important for devel-oping more efficient anomaly detectors, thereby improving neural network robustness. In this study, we propose two strong and effective black-box attackers, an attention-based and a gradient-based attacker, to defeat three target systems: MLP, AutoEncoder, and DeepLog.Our approach facilitates the generation of more effective adversarial examples with the help of the analysis of vulnerable logkeys. The proposed attention-based attacker leverages attention weights to achieve vulnerable logkeys and derive adversarial examples, which are implemented using our previously developed attention-based convolutional neural network model. The proposed gradient-based attacker calculates gradients based on potential vulnerable logkeys to seek an optimal adversarial sample. The experimental results showed that these two approaches significantly outperformed the state-of-the-art attacker model log anomaly mask (LAM). In particular, owing to its optimization, the proposed gradient-based attacker approach can significantly increase the misclassification rate on three target models, yields a 70% successful attack rate on DeepLog and greatly exceeds the baseline by 52%.(c) 2022 The Author(s). Published by Elsevier Inc. This is an open access article under the CCBY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:249 / 262
页数:14
相关论文
共 41 条
[11]  
Guo HX, 2021, Arxiv, DOI arXiv:2103.04475
[12]  
Herath J.D, 2021, P 11 ACM C DATA APPL, P29
[13]  
Goodfellow IJ, 2015, Arxiv, DOI arXiv:1412.6572
[14]  
Johnson C, 2020, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., V11, P31, DOI [10.22667/JOWUA.2020.12.31.031, DOI 10.22667/JOWUA.2020.12.31.031]
[15]   Witnesses for the Doctor in the Loop [J].
Kieseberg, Peter ;
Schantl, Johannes ;
Fruehwirt, Peter ;
Weippl, Edgar ;
Holzinger, Andreas .
BRAIN INFORMATICS AND HEALTH (BIH 2015), 2015, 9250 :369-378
[16]  
Komisarek M, 2021, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., V12, P3
[17]   3LPR: A three-stage label propagation and reassignment framework for class-imbalanced semi-supervised learning [J].
Kong, Xiangyuan ;
Wei, Xiang ;
Liu, Xiaoyu ;
Wang, Jingjie ;
Lu, Siyang ;
Xing, Weiwei ;
Lu, Wei .
KNOWLEDGE-BASED SYSTEMS, 2022, 253
[18]   Log-based Abnormal Task Detection and Root Cause Analysis for Spark [J].
Le, Siyang ;
Rao, BingBing ;
Wei, Xiang ;
Tak, Byungchul ;
Wang, Long ;
Wang, Liqiang .
2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, :389-396
[19]   LADRA: Log-based abnormal task detection and root-cause analysis in big data processing with Spark [J].
Lu, Siyang ;
Wei, Xiang ;
Rao, Bingbing ;
Tak, Byungchul ;
Wang, Long ;
Wang, Liqiang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 :392-403
[20]   Detecting Anomaly in Big Data System Logs Using Convolutional Neural Network [J].
Lu, Siyang ;
Wei, Xiang ;
Li, Yandong ;
Wang, Liqiang .
2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, :151-158