Intrusion detection systems vulnerability on adversarial examples

被引:0
作者
Warzynski, Arkadiusz [1 ]
Kolaczek, Grzegorz [1 ]
机构
[1] Wroclaw Univ Sci & Technol, Fac Comp Sci & Management, 27 Wybrzeze Wyspianskiego St, PL-50370 Wroclaw, Poland
来源
2018 INNOVATIONS IN INTELLIGENT SYSTEMS AND APPLICATIONS (INISTA) | 2018年
关键词
Anomaly detection; Adversarial examples; intrusion detection systems;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection systems define an important and dynamic research area for cybersecurity. The role of Intrusion Detection System within security architecture is to improve a security level by identification of all malicious and also suspicious events that could be observed in computer or network system. One of the more specific research areas related to intrusion detection is anomaly detection. Anomaly-based intrusion detection in networks refers to the problem of finding untypical events in the observed network traffic that do not conform to the expected normal patterns. It is assumed that everything that is untypical/anomalous could be dangerous and related to some security events. To detect anomalies many security systems implements a classification or clustering algorithms. However, recent research proved that machine learning models might misclassify adversarial events, e.g. observations which were created by applying intentionally non-random perturbations to the dataset. Such weakness could increase of false negative rate which implies undetected attacks. This fact can lead to one of the most dangerous vulnerabilities of intrusion detection systems. The goal of the research performed was verification of the anomaly detection systems ability to resist this type of attack. This paper presents the preliminary results of tests taken to investigate existence of attack vector, which can use adversarial examples to conceal a real attack from being detected by intrusion detection systems.
引用
收藏
页数:4
相关论文
共 14 条
[1]  
[Anonymous], POSTKDD CUP 99 DATA
[2]  
[Anonymous], 2016, arXiv
[3]  
[Anonymous], 2013, DETAILED ANAL NSL KD
[4]  
[Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
[5]  
[Anonymous], PRESENTATION WI FI A
[6]  
[Anonymous], P 1 IEEE EUR S SEC P
[7]  
[Anonymous], 2013, 2 INT C LEARNING REP
[8]  
[Anonymous], NSL KDD DAT SET NETW
[9]  
Bengio S., 2017, ICLR
[10]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336