Investigating the practicality of adversarial evasion attacks on network intrusion detection

被引:0
|
作者
Mohamed Amine Merzouk
Frédéric Cuppens
Nora Boulahia-Cuppens
Reda Yaich
机构
[1] Polytechnique Montréal,
[2] IRT SystemX,undefined
来源
Annals of Telecommunications | 2022年 / 77卷
关键词
Adversarial machine learning; Adversarial examples; Intrusion detection; Evasion attacks;
D O I
暂无
中图分类号
学科分类号
摘要
As machine learning models are increasingly integrated into critical cybersecurity tools, their security issues become a priority. Particularly after the rise of adversarial examples, original data to which a small and well-computed perturbation is added to influence the prediction of the model. Applied to cybersecurity tools, like network intrusion detection systems, they could allow attackers to evade detection mechanisms that rely on machine learning. However, if the perturbation does not consider the constraints of network traffic, the adversarial examples may be inconsistent, thus making the attack invalid. These inconsistencies are a major obstacle to the implementation of end-to-end network attacks. In this article, we study the practicality of adversarial attacks for the purpose of evading network intrusion detection models. We evaluate the impact of state-of-the-art attacks on three different datasets. Through a fine-grained analysis of the generated adversarial examples, we introduce and discuss four key criteria that are necessary for the validity of network traffic, namely value ranges, binary values, multiple category membership, and semantic relations.
引用
收藏
页码:763 / 775
页数:12
相关论文
共 50 条
  • [1] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 763 - 775
  • [2] Defending network intrusion detection systems against adversarial evasion attacks
    Pawlicki, Marek
    Choras, Michal
    Kozik, Rafal
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 148 - 154
  • [3] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [4] Improved Robust Adversarial Model against Evasion Attacks on Intrusion Detection Systems
    Anaedevha, R. N.
    Trofimov, A. G.
    OPTICAL MEMORY AND NEURAL NETWORKS, 2024, 33 (SUPPL3) : S414 - S423
  • [5] Investigating the evasion-resilience of Network Intrusion Detection Systems
    Ytreberg, Jarle
    Papadaki, Maria
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 327 - 334
  • [6] Adversarial Attacks Against Network Intrusion Detection in IoT Systems
    Qiu, Han
    Dong, Tian
    Zhang, Tianwei
    Lu, Jialiang
    Memmi, Gerard
    Qiu, Meikang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10327 - 10335
  • [7] TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
    Debicha, Islam
    Bauwens, Richard
    Debatty, Thibault
    Dricot, Jean -Michel
    Kenaza, Tayeb
    Mees, Wim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 : 185 - 197
  • [8] Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
    Usama, Muhammad
    Asim, Muhammad
    Latif, Siddique
    Qadir, Junaid
    Ala-Al-Fuqaha
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 78 - 83
  • [9] Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning
    Yang, Ziyuan
    Qu, Haipeng
    Hua, Ying
    Zhang, Xiaoshuai
    Lin, Xijun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 146 - 157
  • [10] Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
    Apruzzese, Giovanni
    Andreolini, Mauro
    Ferretti, Luca
    Marchetti, Mirco
    Colajanni, Michele
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03):