A Comparative Study on the Impact of Adversarial Machine Learning Attacks on Contemporary Intrusion Detection Datasets

被引:0
作者
Pujari M. [1 ]
Pacheco Y. [1 ]
Cherukuri B. [1 ]
Sun W. [1 ]
机构
[1] University of Toledo, Toledo, OH
关键词
Adversarial machine learning; Deep learning; Deep neural networks; Intrusion detection datasets; Intrusion detection systems;
D O I
10.1007/s42979-022-01321-8
中图分类号
学科分类号
摘要
Adversarial attack techniques have taken a firm stand against the capabilities of deep neural networks, rendering them less efficient in performing their functions. Various kind of attacks have been studied and appropriate defense mechanisms have been proposed in the Computer Vision and Image Processing domains. The progress in Intrusion Detection System (IDS) domain is relatively less although it is gaining momentum lately. One of the concerns in the IDS domain is that most of the research work has been carried out using old datasets. There is a need to study the properties of newer benchmark datasets and analyze their characteristics under adversarial settings. Contemporary datasets include modern network behaviors and attack scenarios, which help IDSs perform well in modern networks. The more realistic a dataset is, the more efficient it can make an IDS model in a real environment. This paper addresses the said concern by conducting a study on recent datasets in the light of adversarial perturbations. We analyze how various adversarial attack algorithms, under white box settings, impact contemporary IDS datasets, namely, UNSW-NB15, Bot-IoT, and CSE-CIC-IDS2018. This paper summarizes the study and discusses how various classification algorithms perform when an IDS model is trained with each of the chosen datasets. The results included in the paper indicate that the adversarial examples are successful in decreasing the detection capabilities of the IDS models covered in the study. We provide a conclusion based on the evaluation results and share thoughts on the direction in which we are headed for future work. © 2022, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 49 条
[1]  
Anderson J.P., Computer security threat monitoring and surveillance, (1980)
[2]  
Kemmerer R.A., Vigna G., Intrusion detection: a brief history and overview, Computer, 35, 4, pp. supl27-supl30, (2002)
[3]  
Innella P., The evolution of intrusion detection systems, Tetrad Digit Integr, pp. 1-15, (2001)
[4]  
Li A.Z.D., A brief history of machine learning in cybersecurity, (2022)
[5]  
Othman S.M., Ba-Alwi F.M., Alsohybe N.T., Al-Hashida A.Y., Intrusion detection model using machine learning algorithm on big data environment, J Big Data, (2018)
[6]  
Dalvi N., Domingos P., Sanghai S., Verma D., Adversarial classification, Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 99-108, (2004)
[7]  
Biggio B., Corona I., Maiorca D., Nelson B., Srndic N., Laskov P., Giacinto G., Roli F., Evasion attacks against machine learning at test time, Advanced information systems engineering, pp. 387-402, (2013)
[8]  
Carlini N., Wagner D., Towards evaluating the robustness of neural networks, IEEE Symp Secur Priv (SP), (2017)
[9]  
Goodfellow I.J., Shlens J., Szegedy C., Explaining and harnessing adversarial examples, 3Rd International Conference on Learning Representations (ICLR), ICLR, (2015)
[10]  
Papernot N., McDaniel P., Goodfellow I. Transferability in machine learning: From phenomena to black-box attacks using adversarial samples, 2016. Arxiv Preprint Arxiv, (1605)