Investigating the practicality of adversarial evasion attacks on network intrusion detection

被引:0
作者
Mohamed Amine Merzouk
Frédéric Cuppens
Nora Boulahia-Cuppens
Reda Yaich
机构
[1] Polytechnique Montréal,
[2] IRT SystemX,undefined
来源
Annals of Telecommunications | 2022年 / 77卷
关键词
Adversarial machine learning; Adversarial examples; Intrusion detection; Evasion attacks;
D O I
暂无
中图分类号
学科分类号
摘要
As machine learning models are increasingly integrated into critical cybersecurity tools, their security issues become a priority. Particularly after the rise of adversarial examples, original data to which a small and well-computed perturbation is added to influence the prediction of the model. Applied to cybersecurity tools, like network intrusion detection systems, they could allow attackers to evade detection mechanisms that rely on machine learning. However, if the perturbation does not consider the constraints of network traffic, the adversarial examples may be inconsistent, thus making the attack invalid. These inconsistencies are a major obstacle to the implementation of end-to-end network attacks. In this article, we study the practicality of adversarial attacks for the purpose of evading network intrusion detection models. We evaluate the impact of state-of-the-art attacks on three different datasets. Through a fine-grained analysis of the generated adversarial examples, we introduce and discuss four key criteria that are necessary for the validity of network traffic, namely value ranges, binary values, multiple category membership, and semantic relations.
引用
收藏
页码:763 / 775
页数:12
相关论文
共 50 条
[41]   Intrusion Detection Method Based on Complementary Adversarial Generation Network [J].
Li, Lixiang ;
Liu, Yuxuan ;
Peng, Haipeng .
ADVANCES IN SWARM INTELLIGENCE, ICSI 2023, PT II, 2023, 13969 :260-271
[42]   Adversarial Human Context Recognition: Evasion Attacks and Defenses [J].
Alajaji, Abdulaziz ;
Gerych, Walter ;
Chandrasekaran, Kavin ;
Buquicchio, Luke ;
Agu, Emmanuel ;
Rundensteiner, Elke .
2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, :223-232
[43]   Toward Transferable Adversarial Attacks Against Autoencoder-Based Network Intrusion Detectors [J].
Zhang, Yihang ;
Wu, Yingwen ;
Huang, Xiaolin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (12) :13863-13872
[44]   Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles [J].
Aloraini, Fatimah ;
Javed, Amir .
2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, :714-719
[45]   Adversarial Attacks on Intrusion Detection Systems in In-Vehicle Networks of Connected and Autonomous Vehicles [J].
Aloraini, Fatimah ;
Javed, Amir ;
Rana, Omer .
SENSORS, 2024, 24 (12)
[46]   Adversarial Attacks on AI based Intrusion Detection System for Heterogeneous Wireless Communications Networks [J].
Ali, Muhammad ;
Hu, Yim-Fun ;
Luong, Doanh Kim ;
Oguntala, George ;
Li, Jian-Ping ;
Abdo, Kanaan .
2020 AIAA/IEEE 39TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) PROCEEDINGS, 2020,
[47]   Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense [J].
Alotaibi, Afnan ;
Rassam, Murad A. .
FUTURE INTERNET, 2023, 15 (02)
[48]   A Comparative Study on the Impact of Adversarial Machine Learning Attacks on Contemporary Intrusion Detection Datasets [J].
Pujari M. ;
Pacheco Y. ;
Cherukuri B. ;
Sun W. .
SN Computer Science, 3 (5)
[49]   Robust Data-Driven Detection of Electricity Theft Adversarial Evasion Attacks in Smart Grids [J].
Takiddin, Abdulrahman ;
Ismail, Muhammad ;
Serpedin, Erchin .
IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (01) :663-676
[50]   A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks [J].
Nathaniel, Dhinakaran ;
Soosai, Anto .
ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2023, 23 (04) :81-88