Adversarial Attack against DoS Intrusion Detection: An Improved Boundary-Based Method

被引:27
作者
Peng, Xiao [1 ,2 ]
Huang, Weiqing [1 ,2 ]
Shi, Zhixin [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019) | 2019年
关键词
Adversarial samples; DoS detection; ANN; Boundary-based attack; Optimization; Mahalanobis distance;
D O I
10.1109/ICTAI.2019.00179
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial of Service (DoS) attacks pose serious threats to network security. With the rapid development of machine learning technologies, artificial neural network (ANN) has been used to classify DoS attacks. However, ANN models are vulnerable to adversarial samples: inputs that are specially crafted to yield incorrect outputs. In this work, we explore a kind of DoS adversarial attacks which aim to bypass ANN-based DoS intrusion detection systems. By analyzing features of DoS samples, we propose an improved boundary-based method to craft adversarial DoS samples. The key idea is to optimize a Mahalanobis distance by perturbing continuous features and discrete features of DoS samples respectively. We experimentally study the effectiveness of our method in two trained ANN classifiers on KDDcup99 dataset and CICIDS2017 dataset. Results show that our method can craft adversarial DoS samples with limited queries.
引用
收藏
页码:1288 / 1295
页数:8
相关论文
共 31 条
  • [1] [Anonymous], 2016, ARXIV161107400
  • [2] Barati M, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P268, DOI 10.1109/ISBAST.2014.7013133
  • [3] Bivens A., 2002, P INT ENG SYST NEUR, V12, P579
  • [4] Brendel Wieland, 2017, arXiv:1712.04248.
  • [5] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [6] Cheng M., 2018, INT C LEARN REPR
  • [7] Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
    Corona, Igino
    Giacinto, Giorgio
    Roli, Fabio
    [J]. INFORMATION SCIENCES, 2013, 239 : 201 - 225
  • [8] Du SW, 2016, ADVANCES OF TRANSPORTATION: INFRASTRUCTURE AND MATERIALS, VOL 1, P219
  • [9] Goodfellow I J, 2015, P INT C LEARN REPR I
  • [10] Ibitoye Olakunle, 2019, ARXIV190505137