VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems

被引:9
作者
Liu, Guangrui [1 ]
Zhang, Weizhe [1 ,2 ]
Li, Xinjie [1 ]
Fan, Kaisheng [1 ]
Yu, Shui [3 ]
机构
[1] Harbin Inst Technol, Sch Cyberspace Sci, Harbin 150001, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518055, Peoples R China
[3] Univ Technol Sydney, Sch Comp Sci, Ultimo 2007, Australia
基金
中国国家自然科学基金;
关键词
AI security; adversarial sample; data poisoning; network intrusion detection; generative adversarial network; ADVERSARIAL ATTACKS; BOTNET DETECTION;
D O I
10.1007/s11432-021-3455-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning-based network intrusion detection systems (ML-NIDS) are extensively used for network security against unknown attacks. Existing intrusion detection systems can effectively defend traditional network attacks, however, they face AI based threats. The current known AI attacks cannot balance the escape rate and attack effectiveness. In addition, the time cost of existing AI attacks is very high. In this paper, we propose a backdoor attack called VulnerGAN, which features high concealment, high aggressiveness, and high timeliness. The backdoor can make the specific attack traffic bypass the detection of ML-NIDS without affecting the performance of ML-NIDS in identifying other attack traffic. VulnerGAN uses generative adversarial networks (GAN) to calculate poisoning and adversarial samples based on machine learning model vulnerabilities. It can make traditional network attack traffic escape black-box online ML-NIDS. At the same time, model extraction and fuzzing test are used to enhance the convergence of VulnerGAN. Compared with the state-of-the-art algorithms, the VulnerGAN backdoor attack increases 33.28% in concealment, 18.48% in aggressiveness, and 46.32% in timeliness.
引用
收藏
页数:19
相关论文
共 45 条
[1]   Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs [J].
Aiken, James ;
Scott-Hayward, Sandra .
2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
[2]  
Alhajjar E., 2020, ARXIV200411898
[3]  
[Anonymous], 2014, PROC 2 INT C LEARN R
[4]  
[Anonymous], 2021, McAfee Labs Threats Report
[5]   Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems [J].
Anthi, Eirini ;
Williams, Lowri ;
Rhode, Matilda ;
Burnap, Pete ;
Wedgbury, Adam .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
[6]  
Charlier J., 2019, ARXIV190809899
[7]  
Chung SP, 2006, LECT NOTES COMPUT SC, V4219, P61
[8]  
Clements Joseph, 2019, ARXIV190311688
[9]   An adaptive system for detecting malicious queries in web attacks [J].
Dong, Ying ;
Zhang, Yuqing ;
Ma, Hua ;
Wu, Qianru ;
Liu, Qixu ;
Wang, Kai ;
Wang, Wenjie .
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
[10]   Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic [J].
Elmasry, Wisam ;
Akbulut, Akhan ;
Zaim, Abdul Halim .
COMPUTER NETWORKS, 2020, 168