Evaluating Deep Learning Based Network Intrusion Detection System in Adversarial Environment

被引:0
作者
Peng, Ye [1 ]
Su, Jinshu [1 ]
Shi, Xiangquan [1 ]
Zhao, Baokang [1 ]
机构
[1] Natl Univ Def Technol, Coll Compute, Changsha 410073, Hunan, Peoples R China
来源
PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019) | 2019年
关键词
network and data security; network intrusion system; deep learning; security evaluation;
D O I
10.1109/iceiec.2019.8784514
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning plays a vital role in network security field. Furthermore, the performance of deep learning based Network Intrusion Detection System (NIDS) is satisfactory and even better than the traditional methods. However, recent researches show that the accuracy of deep learning based image classification declines sharply when facing the adversaries. Regarding NIDS, there is no comprehensive evaluation of whether it will also be affected by attack models. In this paper, we propose a framework of Evaluationg Network Intrusion Detection System (ENIDS) to research the robustness of deep learning based NIDS in adversarial environment. More specifically, we train four target models (e.g., Deep Neural Networks, Support Vector Machine, Random Forest and Logistic Regression) over the benchmark dataset NSL-KDD. Furthermore, four advanced attack models (e.g., Projected Gradient Descent attack, Momentum Iterative Fast Gradient Sign Method, L-BFGS attack and SPSA attack) are used to generate adversarial samples. Finally, comprehensive and extensive experiment results show that the effectiveness of deep learning based NIDS is greatly undermined by the adversaries.
引用
收藏
页码:61 / 66
页数:6
相关论文
共 15 条
  • [1] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [2] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
  • [3] Boosting Adversarial Attacks with Momentum
    Dong, Yinpeng
    Liao, Fangzhou
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    Hu, Xiaolin
    Li, Jianguo
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 9185 - 9193
  • [4] Goodfellow IJ., EXPLAINING HARNESSIN
  • [5] Hilbe JM, 2009, CH CRC TEXT STAT SCI, P1
  • [6] A survey of deep learning-based network anomaly detection
    Kwon, Donghwoon
    Kim, Hyunjoo
    Kim, Jinoh
    Suh, Sang C.
    Kim, Ikkyun
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 949 - 961
  • [7] Intrusion detection system: A comprehensive review
    Liao, Hung-Jen
    Lin, Chun-Hung Richard
    Lin, Ying-Chih
    Tung, Kuang-Yuan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 16 - 24
  • [8] Madry A., DEEP LEARNING MODELS
  • [9] Machine Learning in Adversarial Settings
    McDaniel, Patrick
    Papernot, Nicolas
    Celik, Z. Berkay
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (03) : 68 - 72
  • [10] Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
    Mirsky, Yisroel
    Doitshman, Tomer
    Elovici, Yuval
    Shabtai, Asaf
    [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,