Adversarial attacks against supervised machine learning based network intrusion detection systems

被引:14
作者
Alshahrani, Ebtihaj [1 ]
Alghazzawi, Daniyal [1 ]
Alotaibi, Reem [2 ]
Rabie, Osama [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Informat Syst Dept, Jeddah, Saudi Arabia
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Informat Technol Dept, Jeddah, Saudi Arabia
关键词
D O I
10.1371/journal.pone.0275971
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Adversarial machine learning is a recent area of study that explores both adversarial attack strategy and detection systems of adversarial attacks, which are inputs specially crafted to outwit the classification of detection systems or disrupt the training process of detection systems. In this research, we performed two adversarial attack scenarios, we used a Generative Adversarial Network (GAN) to generate synthetic intrusion traffic to test the influence of these attacks on the accuracy of machine learning-based Intrusion Detection Systems (IDSs). We conducted two experiments on adversarial attacks including poisoning and evasion attacks on two different types of machine learning models: Decision Tree and Logistic Regression. The performance of implemented adversarial attack scenarios was evaluated using the CICIDS2017 dataset. Also, it was based on a comparison of the accuracy of machine learning-based IDS before and after attacks. The results show that the proposed evasion attacks reduced the testing accuracy of both network intrusion detection systems models (NIDS). That illustrates our evasion attack scenario negatively affected the accuracy of machine learning-based network intrusion detection systems, whereas the decision tree model was more affected than logistic regression. Furthermore, our poisoning attack scenario disrupted the training process of machine learning-based NIDS, whereas the logistic regression model was more affected than the decision tree.
引用
收藏
页数:14
相关论文
共 36 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]   Addressing Adversarial Attacks Against Security Systems Based on Machine Learning [J].
Apruzzese, Giovanni ;
Colajanni, Michele ;
Ferretti, Luca ;
Marchetti, Mirco .
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, :383-400
[3]  
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[4]  
Barrett P, 2005, ASTR SOC P, V347, P91
[5]  
Brundage M, 2018, Arxiv, DOI [arXiv:1802.07228, 10.48550/arXiv.1802.07228, DOI 10.48550/ARXIV.1802.07228]
[6]  
Chen T, 2014, INT WORKS HIGH MOBIL, P1, DOI 10.1109/HMWC.2014.7000203
[7]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[8]   An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks [J].
Depren, O ;
Topallar, M ;
Anarim, E ;
Ciliz, MK .
EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) :713-722
[9]   Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers [J].
Gao, Ji ;
Lanchantin, Jack ;
Soffa, Mary Lou ;
Qi, Yanjun .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :50-56
[10]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672