Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks

被引:66
作者
Apruzzese, Giovanni [1 ]
Andreolini, Mauro [2 ]
Marchetti, Mirco [3 ]
Venturi, Andrea [3 ]
Colajanni, Michele [4 ]
机构
[1] Univ Liechtenstein, Hilti Chair Data & Applicat Secur, FL-9490 Vaduz, Liechtenstein
[2] Univ Modena & Reggio Emilia, Dept Phys Comp Sci & Math, I-41121 Modena, Italy
[3] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, I-41121 Modena, Italy
[4] Univ Bologna, Dept Informat Sci & Engn, I-40126 Bologna, Italy
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 04期
关键词
Detectors; Botnet; Training; Computer security; Machine learning; Feature extraction; Perturbation methods; Adversarial attack; machine learning; network intrusion detection; deep reinforcement learning; botnet; INTRUSION;
D O I
10.1109/TNSM.2020.3031843
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defenses escalate as well. Supervised classifiers are prone to adversarial evasion, and existing countermeasures suffer from many limitations. Most solutions degrade performance in the absence of adversarial perturbations; they are unable to face novel attack variants; they are applicable only to specific machine learning algorithms. We propose the first framework that can protect botnet detectors from adversarial attacks through deep reinforcement learning mechanisms. It automatically generates realistic attack samples that can evade detection, and it uses these samples to produce an augmented training set for producing hardened detectors. In such a way, we obtain more resilient detectors that can work even against unforeseen evasion attacks with the great merit of not penalizing their performance in the absence of specific attacks. We validate our proposal through an extensive experimental campaign that considers multiple machine learning algorithms and public datasets. The results highlight the improvements of the proposed solution over the state-of-the-art. Our method paves the way to novel and more robust cybersecurity detectors based on machine learning applied to network traffic analytics.
引用
收藏
页码:1975 / 1987
页数:13
相关论文
共 71 条
[21]   Adversarial Training of Gradient-Boosted Decision Trees [J].
Calzavara, Stefano ;
Lucchese, Claudio ;
Tolomei, Gabriele .
PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, :2429-2432
[22]  
Carlini N., 2018, PROC IEEE SECURITY P, P1
[23]   Malwise-An Effective and Efficient Classification System for Packed and Polymorphic Malware [J].
Cesare, Silvio ;
Xiang, Yang ;
Zhou, Wanlei .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (06) :1193-1206
[24]  
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[25]  
Chernikova A., 2020, FENCE FEASIBLE EVASI
[26]  
Chuanlong Y., 2019, SPRINGER J SUPERCOMP, V76, P6690
[27]   Evading Classifiers by Morphing in the Dark [J].
Dang, Hung ;
Huang, Yue ;
Chang, Ee-Chien .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :119-133
[28]  
Demontis A, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P321
[29]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[30]  
Fajana O., 2018, P IEEE 17 INT S NETW, P1