IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection

被引:72
|
作者
Lin, Zilong [1 ,2 ]
Shi, Yong [1 ]
Xue, Zhi [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[2] Indiana Univ Bloomington, Bloomington, IN USA
来源
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT III | 2022年 / 13282卷
关键词
Generative adversarial networks; Intrusion detection; Adversarial examples; Black-box attack;
D O I
10.1007/978-3-031-05981-0_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As an essential tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic. Nowadays, with the help of machine learning algorithms, intrusion detection systems develop rapidly. However, the robustness of this system is questionable when it faces adversarial attacks. For the robustness of detection systems, more potential attack approaches are under research. In this paper, a framework of the generative adversarial networks, called IDSGAN, is proposed to generate the adversarial malicious traffic records aiming to attack intrusion detection systems by deceiving and evading the detection. Given that the internal structure and parameters of the detection system are unknown to attackers, the adversarial attack examples perform the black-box attacks against the detection system. IDSGAN leverages a generator to transform original malicious traffic records into adversarial malicious ones. A discriminator classifies traffic examples and dynamically learns the real-time black-box detection system. More significantly, the restricted modification mechanism is designed for the adversarial generation to preserve original attack functionalities of adversarial traffic records. The effectiveness of the model is indicated by attacking multiple algorithm-based detection models with different attack categories. The robustness is verified by changing the number of the modified features. A comparative experiment with adversarial attack baselines demonstrates the superiority of our model.
引用
收藏
页码:79 / 91
页数:13
相关论文
共 50 条
  • [21] G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System
    Shahriar, Md Hasan
    Haque, Nur Imtiazul
    Rahman, Mohammad Ashiqur
    Alonso, Miguel, Jr.
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 376 - 385
  • [22] Sparse Adversarial Attack on Modulation Recognition with Adversarial Generative Networks
    Liang, Kui
    Liu, Zhidong
    Zhao, Xin
    Zeng, Cheng
    Cai, Jun
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 104 - 108
  • [23] Adversarial Attack against LSTM-based DDoS Intrusion Detection System
    Huang, Weiqing
    Peng, Xiao
    Shi, Zhixin
    Ma, Yuru
    2020 IEEE 32ND INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2020, : 686 - 693
  • [24] Adversarial Attack Detection Approach for Intrusion Detection Systems
    Degirmenci, Elif
    Ozcelik, Ilker
    Yazici, Ahmet
    IEEE ACCESS, 2024, 12 : 195996 - 196009
  • [25] Dual Generative Adversarial Networks Based Unknown Encryption Ransomware Attack Detection
    Zhang, Xueqin
    Wang, Jiyuan
    Zhu, Shinan
    IEEE ACCESS, 2022, 10 : 900 - 913
  • [26] ADS-B Data Attack Detection Based on Generative Adversarial Networks
    Li, Tengyao
    Wang, Buhong
    Shang, Fute
    Tian, Jiwei
    Cao, Kunrui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 323 - 336
  • [27] Optimized Generative Adversarial Networks for Adversarial Sample Generation
    Alghazzawi, Daniyal M.
    Hasan, Syed Hamid
    Bhatia, Surbhi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3877 - 3897
  • [28] Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks
    Mozo, Alberto
    Gonzalez-Prieto, Angel
    Pastor, Antonio
    Gomez-Canaval, Sandra
    Talavera, Edgar
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [29] Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks
    Alberto Mozo
    Ángel González-Prieto
    Antonio Pastor
    Sandra Gómez-Canaval
    Edgar Talavera
    Scientific Reports, 12
  • [30] Multi-Critics Generative Adversarial Networks for Imbalanced Data in Intrusion Detection System
    Wang, Haofan
    Kandah, Farah
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,