Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection

被引:27
作者
Wang, Jianyu [1 ]
Pan, Jianli [1 ]
AlQerm, Ismail [1 ]
Liu, Yuanni [2 ]
机构
[1] Univ Missouri, Dept Comp Sci, St Louis, MO 63121 USA
[2] Chongqing Univ Posts & Telecommun, Inst Future Network Technol, Chongqing, Peoples R China
来源
30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021) | 2021年
基金
美国国家科学基金会;
关键词
Network intrusion detection; adversarial attacks; deep learning; THINGS;
D O I
10.1109/ICCCN52240.2021.9522215
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection plays an important role in the Internet of Things systems for protecting devices from security breaches. Facing challenges of the rapidly increasing amount of diverse network traffic, recent research has employed end-to-end deep learning-based intrusion detectors for automatic feature extraction and high detection accuracy. However, deep learning has been proved vulnerable to adversarial attacks that may cause misclassification by imposing imperceptible perturbation on input samples. Though such vulnerability is widely discussed in the image processing domain, very few studies have investigated its perniciousness against network intrusion detection systems (NIDS) and proposed corresponding defense strategies. In this paper, we try to fill this gap by proposing Def-IDS, an ensemble defense mechanism specially designed for NIDS, against both known and unknown adversarial attacks. It is a two-module training framework that integrates multi-class generative adversarial networks and multi-source adversarial retraining to improve model robustness, while the detection accuracy on unperturbed samples is maintained. We evaluate the mechanism over CSE-CIC-IDS2018 dataset and compare its performance with the other three defense methods. The results demonstrate that Def-IDS is able to detect various adversarial attacks with better precision, recall, F1 score, and accuracy.
引用
收藏
页数:9
相关论文
共 25 条
[1]  
BRENDEL W., 2017, PROC 6 INT C LEARN R
[2]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[3]  
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[4]   Internet of Things: A survey on machine learning-based intrusion detection approaches [J].
da Costa, Kelton A. P. ;
Papa, Joao P. ;
Lisboa, Celso O. ;
Munoz, Roberto ;
de Albuquerque, Victor Hugo C. .
COMPUTER NETWORKS, 2019, 151 :147-157
[5]   Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) :169-175
[6]  
Goodfellow I. J., 2014, INT C LEARNING REPRE
[7]   Making Machine Learning Robust Against Adversarial Inputs [J].
Goodfellow, Ian ;
McDaniel, Patrick ;
Papernot, Nicolas .
COMMUNICATIONS OF THE ACM, 2018, 61 (07) :56-66
[8]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[9]   Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks [J].
Ibitoye, Olakunle ;
Shafiq, Omair ;
Matrawy, Ashraf .
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
[10]  
Kurakin A., 2016, P INT C LEARN REPR