ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions

被引:5
|
作者
Lin, Ying-Dar [1 ]
Pratama, Jehoshua-Hanky [1 ]
Sudyana, Didik [1 ]
Lai, Yuan-Cheng [2 ]
Hwang, Ren-Hung [3 ]
Lin, Po-Ching [4 ]
Lin, Hsuan-Yu [5 ]
Lee, Wei-Bin [6 ]
Chiang, Chen-Kuo [4 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Hsinchu 300, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Taipei 106, Taiwan
[3] Natl Yang Ming Chiao Tung Univ, Tainan 711, Taiwan
[4] Natl Chung Cheng Univ, Chiayi 621, Taiwan
[5] Telecom Technol Ctr, New Taipei City, Taiwan
[6] Foxconn Res, New Taipei City, Taiwan
关键词
Adversarial attack; Machine learning; Intrusion detection; Ensemble learning; ATTACKS;
D O I
10.1016/j.jisa.2022.103348
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection systems (NIDSs) now adopt machine learning (ML) for detection of wide attack variants. However, ML is also known vulnerable to adversarial attacks, which can degrade the accuracy of ML. A number of defense strategies have been proposed but mostly in image classification areas. In this work, we propose Ensemble Learning with Adversarial Training (ELAT) to combine adversarial training and ensemble learning into a solution. We compare four approaches: single, ensemble, adversarial and ELAT. In the experiments, several models were developed and tested using different approaches to know which method is robust against adversarial attacks for ML-based NIDSs. The average F1 score for the single models was 0.93 within a wide range (0.82-0.99), but dropped to 0.29 when facing adversarial attacks, particularly dropped to 0.07 caused by the strongest attack, Projected Gradient Descent (PGD). With ensemble, adversarial and ELAT, the average scores were recovered to 0.80, 0.88 and 0.91, respectively. In addition, this work involves prediction of the models and approach implemented behind the system using cosine similarity with an accuracy of 99.9%.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Defending grids against intrusions
    Schulter, Alexandre
    Vieira, Kleber
    Westphall, Carlos Becker
    Westphail, Carla
    SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2006, 4124 : 248 - 250
  • [2] ENSEMBLE ADVERSARIAL TRAINING BASED DEFENSE AGAINST ADVERSARIAL ATTACKS FOR MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEM
    Haroon, M. S.
    Ali, H. M.
    NEURAL NETWORK WORLD, 2023, 33 (05) : 317 - 336
  • [3] CardioDefense: Defending against adversarial attack in ECG classification with adversarial distillation training
    Shao, Jiahao
    Geng, Shijia
    Fu, Zhaoji
    Xu, Weilun
    Liu, Tong
    Hong, Shenda
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 91
  • [4] Defending against Adversarial Attacks in Federated Learning on Metric Learning Model
    Gu, Zhipin
    Shi, Jiangyong
    Yang, Yuexiang
    He, Liangzhong
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 197 - 206
  • [5] DeepIris: An ensemble approach to defending Iris recognition classifiers against Adversarial Attacks
    Tamizhiniyan, S. R.
    Ojha, Aman
    Meenakshi, K.
    Maragatham, G.
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [6] Defending Network IDS against Adversarial Examples with Continual Learning
    Kozal, Jedrzej
    Zwolinska, Justyna
    Klonowski, Marek
    Wozniak, Michal
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 60 - 69
  • [7] Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
    Wang, Lele
    Liu, Bin
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT II, 2023, 14087 : 3 - 20
  • [8] On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors
    To, Trong-Nghia
    Kim, Danh Le
    Hien, Do Thi Thu
    Khoa, Nghi Hoang
    Hoang, Hien Do
    Duy, Phan The
    Pham, Van-Hau
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [9] Defending Against Adversarial Attacks in Speaker Verification Systems
    Chang, Li-Chi
    Chen, Zesheng
    Chen, Chao
    Wang, Guoping
    Bi, Zhuming
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [10] A Cybersecurity Knowledge Graph Completion Method Based on Ensemble Learning and Adversarial Training
    Wang, Peng
    Liu, Jingju
    Hou, Dongdong
    Zhou, Shicheng
    APPLIED SCIENCES-BASEL, 2022, 12 (24):