Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks

被引:62
作者
Apruzzese, Giovanni [1 ]
Andreolini, Mauro [2 ]
Marchetti, Mirco [3 ]
Venturi, Andrea [3 ]
Colajanni, Michele [4 ]
机构
[1] Univ Liechtenstein, Hilti Chair Data & Applicat Secur, FL-9490 Vaduz, Liechtenstein
[2] Univ Modena & Reggio Emilia, Dept Phys Comp Sci & Math, I-41121 Modena, Italy
[3] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, I-41121 Modena, Italy
[4] Univ Bologna, Dept Informat Sci & Engn, I-40126 Bologna, Italy
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 04期
关键词
Detectors; Botnet; Training; Computer security; Machine learning; Feature extraction; Perturbation methods; Adversarial attack; machine learning; network intrusion detection; deep reinforcement learning; botnet; INTRUSION;
D O I
10.1109/TNSM.2020.3031843
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defenses escalate as well. Supervised classifiers are prone to adversarial evasion, and existing countermeasures suffer from many limitations. Most solutions degrade performance in the absence of adversarial perturbations; they are unable to face novel attack variants; they are applicable only to specific machine learning algorithms. We propose the first framework that can protect botnet detectors from adversarial attacks through deep reinforcement learning mechanisms. It automatically generates realistic attack samples that can evade detection, and it uses these samples to produce an augmented training set for producing hardened detectors. In such a way, we obtain more resilient detectors that can work even against unforeseen evasion attacks with the great merit of not penalizing their performance in the absence of specific attacks. We validate our proposal through an extensive experimental campaign that considers multiple machine learning algorithms and public datasets. The results highlight the improvements of the proposed solution over the state-of-the-art. Our method paves the way to novel and more robust cybersecurity detectors based on machine learning applied to network traffic analytics.
引用
收藏
页码:1975 / 1987
页数:13
相关论文
共 71 条
[1]  
Abraham B, 2018, IEEE IJCNN
[2]   Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J].
Al-Dujaili, Abdullah ;
Huang, Alex ;
Hemberg, Erik ;
O'reilly, Una-May .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :76-82
[3]   A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks [J].
Alauthaman, Mohammad ;
Aslam, Nauman ;
Zhang, Li ;
Alasem, Rafe ;
Hossain, M. A. .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (11) :991-1004
[4]   Task Offloading and Resource Allocation for Mobile Edge Computing by Deep Reinforcement Learning Based on SARSA [J].
Alfakih, Taha ;
Hassan, Mohammad Mehedi ;
Gumaei, Abdu ;
Savaglio, Claudio ;
Fortino, Giancarlo .
IEEE ACCESS, 2020, 8 :54074-54084
[5]  
Algelal Z. M., 2020, IAES INT J ELECT COM, V10, P2543
[6]  
Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
[7]   DeepDGA: Adversarially-Tuned Domain Generation and Detection [J].
Anderson, Hyrum S. ;
Woodbridge, Jonathan ;
Filar, Bobby .
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, :13-21
[8]  
Anderson HyrumS., 2018, Learning to evade static pe machine learning malware models via reinforcement learning
[9]   Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors [J].
Apruzzese, Giovanni ;
Colajanni, Michele ;
Marchetti, Mirco .
2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, :193-200
[10]   Addressing Adversarial Attacks Against Security Systems Based on Machine Learning [J].
Apruzzese, Giovanni ;
Colajanni, Michele ;
Ferretti, Luca ;
Marchetti, Mirco .
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, :383-400