Generate qualified adversarial attacks and foster enhanced models based on generative adversarial networks

被引:1
作者
He, Junpeng [1 ]
Luo, Lei [1 ]
Xiao, Kun [1 ]
Fang, Xiyu [1 ,2 ]
Li, Yun [1 ,3 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
[2] CATARC Automot Test Ctr Tianjin Co Ltd, Tianjin, Peoples R China
[3] Chengdu Weichen Informat Technol Co Ltd, Chengdu, Sichuan, Peoples R China
关键词
Adversarial attacks; deep learning (DL); generative adversarial networks (GAN); intrusion detection system (IDS); machine learning (ML);
D O I
10.3233/IDA-216134
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In cybersecurity, intrusion detection systems (IDSes) are of vital importance, allowing different companies and their departments to identify malicious attacks from magnanimous network traffic; however, the effectiveness and stability of these artificial intelligence-based systems are challenged when coping with adversarial attacks. This work explores a creative framework based on a generative adversarial network (GAN) with a series of training algorithms that aims to generate instances of adversarial attacks and utilize them to help establish a new IDS based on a neural network that can replace the old IDS without knowledge of any of its parameters. Furthermore, to verify the quality of the generated attacks, a transfer mechanism is proposed for calculating the Frechet inception distance (FID). Experiments show that based on the original CICIDS2017 dataset, the proposed framework can generate four types of adversarial attacks (DDoS, DoS, Bruteforce, and Infiltration), which precipitate four types of classifiers (Decision Tree, Random Forest, Adaboost, and Deep Neural Network), set as black-box old IDSes, with low detection rates; additionally, the IDSes that the proposed framework newly establish have an average detection rate of 98% in coping with both generated adversarial and original attacks.
引用
收藏
页码:1359 / 1377
页数:19
相关论文
共 32 条
  • [1] Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    [J]. IEEE ACCESS, 2018, 6 : 14410 - 14430
  • [2] Al Tobi Amjad M., 2018, Journal of Cyber Security Technology, V2, P164, DOI 10.1080/23742917.2018.1518061
  • [3] Arjovsky M, 2017, PR MACH LEARN RES, V70
  • [4] Chandrasekhar A. M., 2014, 2014 International Conference on Communications and Signal Processing (ICCSP), P672, DOI 10.1109/ICCSP.2014.6949927
  • [5] Scripted Video Generation With a Bottom-Up Generative Adversarial Network
    Chen, Qi
    Wu, Qi
    Chen, Jian
    Wu, Qingyao
    van den Hengel, Anton
    Tan, Mingkui
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 29 : 7454 - 7467
  • [6] Creech G, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P4487
  • [7] Goodfellow I, 2016, ARXIV
  • [8] Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
  • [9] Auto-Embedding Generative Adversarial Networks For High Resolution Image Synthesis
    Guo, Yong
    Chen, Qi
    Chen, Jian
    Wu, Qingyao
    Shi, Qinfeng
    Tan, Mingkui
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 21 (11) : 2726 - 2737
  • [10] Gupta D., 2017, TRANSFER LEARNING AR