Hardening Random Forest Cyber Detectors Against Adversarial Attacks

被引:41
作者
Apruzzese, Giovanni [1 ]
Andreolini, Mauro [1 ]
Colajanni, Michele [1 ]
Marchetti, Mirco [1 ]
机构
[1] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, I-41121 Modena, Italy
来源
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE | 2020年 / 4卷 / 04期
关键词
Adversarial samples; machine learning; random forest; intrusion detection; flow inspection; botnet; BOTNET DETECTION; SECURITY;
D O I
10.1109/TETCI.2019.2961157
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine learning algorithms are effective in several applications, but they are not as much successful when applied to intrusion detection in cyber security. Due to the high sensitivity to their training data, cyber detectors based on machine learning are vulnerable to targeted adversarial attacks that involve the perturbation of initial samples. Existing defenses assume unrealistic scenarios; their results are underwhelming in non-adversarial settings; or they can be applied only to machine learning algorithms that perform poorly for cyber security. We present an original methodology for countering adversarial perturbations targeting intrusion detection systems based on random forests. As a practical application, we integrate the proposed defense method in a cyber detector analyzing network traffic. The experimental results on millions of labelled network flows show that the new detector has a twofold value: it outperforms state-of-the-art detectors that are subject to adversarial attacks; it exhibits robust results both in adversarial and non-adversarial scenarios.
引用
收藏
页码:427 / 439
页数:13
相关论文
共 52 条
[11]  
Biggio Battista, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P387, DOI 10.1007/978-3-642-40994-3_25
[12]   PATTERN RECOGNITION SYSTEMS UNDER ATTACK: DESIGN ISSUES AND RESEARCH CHALLENGES [J].
Biggio, Battista ;
Fumera, Giorgio ;
Roli, Fabio .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2014, 28 (07)
[13]   A survey of learning-based techniques of email spam filtering [J].
Blanzieri, Enrico ;
Bryl, Anton .
ARTIFICIAL INTELLIGENCE REVIEW, 2008, 29 (01) :63-92
[14]   A survey on multi-output regression [J].
Borchani, Hanen ;
Varando, Gherardo ;
Bielza, Concha ;
Larranaga, Pedro .
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 5 (05) :216-233
[15]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[16]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[17]  
Choudhury S, 2015, 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), P89, DOI 10.1109/ICSTM.2015.7225395
[18]  
DALVI N., 2004, P 10 ACM SIGKDD INT, P99, DOI DOI 10.1145/1014052.1014066
[19]   Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection [J].
Demontis, Ambra ;
Melis, Marco ;
Biggio, Battista ;
Maiorca, Davide ;
Arp, Daniel ;
Rieck, Konrad ;
Corona, Igino ;
Giacinto, Giorgio ;
Roli, Fabio .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) :711-724
[20]   On Security and Sparsity of Linear Classifiers for Adversarial Settings [J].
Demontis, Ambra ;
Russu, Paolo ;
Biggio, Battista ;
Fumera, Giorgio ;
Roli, Fabio .
STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION, S+SSPR 2016, 2016, 10029 :322-332