Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems

被引:0
作者
Hashemi, Mohammad J. [1 ]
Keller, Eric [2 ]
机构
[1] Univ Colorado, Dept Comp Sci, Boulder, CO 80309 USA
[2] Univ Colorado, Dept Elect Comp & Energy Engn, Boulder, CO USA
来源
2020 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN) | 2020年
关键词
Intrusion Detection Systems; Neural Networks; Anomaly Detection; Adversarial Example;
D O I
10.1109/nfv-sdn50289.2020.9289869
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of cyber attacks in both the numbers and varieties in recent years demands to build a more sophisticated network intrusion detection system (NIDS). These NIDS perform better when they can monitor all the traffic traversing through the network like when being deployed on a Software-Defined Network (SDN). Because of the inability to detect zero-day attacks, signature-based NIDS which were traditionally used for detecting malicious traffic are beginning to get replaced by anomaly-based NIDS built on neural networks. However, recently it has been shown that such NIDS have their own drawback namely being vulnerable to the adversarial example attack. Moreover, they were mostly evaluated on the old datasets which don't represent the variety of attacks network systems might face these days. In this paper, we present Reconstruction from Partial Observation (RePO) as a new mechanism to build an NIDS with the help of denoising autoencoders capable of detecting different types of network attacks in a low false alert setting with an enhanced robustness against adversarial example attack. Our evaluation conducted on a dataset with a variety of network attacks shows denoising autoencoders can improve detection of malicious traffic by up to 29% in a normal setting and by up to 45% in an adversarial setting compared to other recently proposed anomaly detectors.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 25 条
[1]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[2]   Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs [J].
Aiken, James ;
Scott-Hayward, Sandra .
2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
[3]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[4]  
[Anonymous], 2019, ABS190103407 CORR
[5]  
[Anonymous], 2018, COMPUTER VISION PATT
[6]  
[Anonymous], 2008, P 25 INT C MACHINE L
[7]  
[Anonymous], 2016, Cyber-Attack Against Ukrainian Critical Infrastructure
[8]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[9]  
Biggio B., 2013, ECMLPKDD
[10]   Audio Adversarial Examples: Targeted Attacks on Speech-to-Text [J].
Carlini, Nicholas ;
Wagner, David .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :1-7