Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System

被引:11
作者
Tapiador, Juan E. [1 ]
Orfila, Agustin [1 ]
Ribagorda, Arturo [1 ]
Ramos, Benjamin [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
Adversarial classification; anomaly detection; intrusion detection systems; secure machine learning;
D O I
10.1109/TDSC.2013.39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to deception, notably in the form of attacks carefully constructed to evade detection. Various learning schemes have been proposed to overcome this weakness. One such system is Keyed IDS (KIDS), introduced at DIMVA "10. KIDS" core idea is akin to the functioning of some cryptographic primitives, namely to introduce a secret element (the key) into the scheme so that some operations are infeasible without knowing it. In KIDS the learned model and the computation of the anomaly score are both key-dependent, a fact which presumably prevents an attacker from creating evasion attacks. In this work we show that recovering the key is extremely simple provided that the attacker can interact with KIDS and get feedback about probing requests. We present realistic attacks for two different adversarial settings and show that recovering the key requires only a small amount of queries, which indicates that KIDS does not meet the claimed security properties. We finally revisit KIDS' central idea and provide heuristic arguments about its suitability and limitations.
引用
收藏
页码:312 / 325
页数:14
相关论文
共 22 条
[1]  
[Anonymous], 2010, P 13 INT C ART INT S
[2]  
[Anonymous], P 6 C EM ANT CEAS 09
[3]  
Barreno M., 2006, P 2006 ACM S INFORM, P16
[4]   The security of machine learning [J].
Barreno, Marco ;
Nelson, Blaine ;
Joseph, Anthony D. ;
Tygar, J. D. .
MACHINE LEARNING, 2010, 81 (02) :121-148
[5]  
Biggio B., 2011, AS C MACH LEARN, P97
[6]  
Biggio B, 2008, LECT NOTES COMPUT SC, V5342, P500, DOI 10.1007/978-3-540-89689-0_54
[7]  
Fogla P., 2006, P 15 C USENIX SEC S
[8]  
Gates C., 2006, PROC WORKSHOP NEW SE, P21
[9]  
Kolesnikov O., 2005, P USENIX SEC S
[10]  
Lowd D., 2005, P 11 ACM SIGKDD INT, P641