Hardening Random Forest Cyber Detectors Against Adversarial Attacks

被引:41
作者
Apruzzese, Giovanni [1 ]
Andreolini, Mauro [1 ]
Colajanni, Michele [1 ]
Marchetti, Mirco [1 ]
机构
[1] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, I-41121 Modena, Italy
来源
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE | 2020年 / 4卷 / 04期
关键词
Adversarial samples; machine learning; random forest; intrusion detection; flow inspection; botnet; BOTNET DETECTION; SECURITY;
D O I
10.1109/TETCI.2019.2961157
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine learning algorithms are effective in several applications, but they are not as much successful when applied to intrusion detection in cyber security. Due to the high sensitivity to their training data, cyber detectors based on machine learning are vulnerable to targeted adversarial attacks that involve the perturbation of initial samples. Existing defenses assume unrealistic scenarios; their results are underwhelming in non-adversarial settings; or they can be applied only to machine learning algorithms that perform poorly for cyber security. We present an original methodology for countering adversarial perturbations targeting intrusion detection systems based on random forests. As a practical application, we integrate the proposed defense method in a cyber detector analyzing network traffic. The experimental results on millions of labelled network flows show that the new detector has a twofold value: it outperforms state-of-the-art detectors that are subject to adversarial attacks; it exhibits robust results both in adversarial and non-adversarial scenarios.
引用
收藏
页码:427 / 439
页数:13
相关论文
共 52 条
[1]  
Abaid Z, 2017, 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), P375
[2]  
Abraham B, 2018, IEEE IJCNN
[3]  
Alazab M., 2011, Ninth Australasian Data Mining Confer-ence AusDM 2011 Conferences in Research and Practice in Information Tech-nology CRPIT, V121, P171
[4]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[5]   DeepDGA: Adversarially-Tuned Domain Generation and Detection [J].
Anderson, Hyrum S. ;
Woodbridge, Jonathan ;
Filar, Bobby .
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, :13-21
[6]  
Apruzzese G., 2018, P IEEE 17 INT S NETW, P1
[7]   Addressing Adversarial Attacks Against Security Systems Based on Machine Learning [J].
Apruzzese, Giovanni ;
Colajanni, Michele ;
Ferretti, Luca ;
Marchetti, Mirco .
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, :383-400
[8]  
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[9]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[10]  
Backes M., 2016, arXiv preprint arXiv:1606.04435, DOI DOI 10.1111/IJFS.12415