A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems

被引:0
|
作者
Monkam, Galamo F. [1 ]
De Lucia, Michael J. [2 ]
Bastian, Nathaniel D. [1 ]
机构
[1] US Mil Acad, Army Cyber Inst, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
[2] US Army Combat Capabil Dev Command, US Army Res Lab, Aberdeen Proving Ground, MD 21005 USA
关键词
Machine learning security; Data poisoning detection; Topological data analysis; Unsupervised learning; Network security; SECURITY;
D O I
10.1016/j.cose.2024.103929
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data poisoning attacks pose a significant security risk to network security software that utilizes machine learning (ML) for network intrusion detection. As network traffic continues to surge, ML becomes indispensable in detecting and characterizing malicious actors attempting to infiltrate computer networks. However, conventional ML assumes a benign environment, leaving room for adversaries to violate this assumption during the training phase. Detecting data poisoning attacks proves to be a challenging task, as attackers employ subtle alterations in the training data to create backdoors, trojans or triggers. Traditional techniques for addressing data poisoning attacks often focus only on enhancing ML model robustness rather than detecting poisoned data, necessitating the development of novel, more effective approaches. Hence, there is an urgent need to develop new methods for identifying poisoned data, ensuring the security of ML. We introduce a novel approach that harnesses the power of topological data analysis and unsupervised learning, enabling the early identification of poisoned data before training an ML model for network intrusion detection. Leveraging our approach, the extraction of topological features and subsequent application of clustering techniques leads to the creation of new clusters exclusively composed of poisoned data for removal prior to ML model training.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A machine learning approach for improving the performance of network intrusion detection systems
    Azizan A.H.
    Mostafa S.A.
    Mustapha A.
    Mohd Foozy C.F.
    Abd Wahab M.H.
    Mohammed M.A.
    Khalaf B.A.
    Annals of Emerging Technologies in Computing, 2021, 5 (Special issue 5) : 201 - 208
  • [32] Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms
    Zhang, Chaoyun
    Costa-Perez, Xavier
    Patras, Paul
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (03) : 1294 - 1311
  • [33] A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data
    Chiba, Tomoki
    Sei, Yuichi
    Tahara, Yasuyuki
    Ohsuga, Akihiko
    2020 IEEE THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE 2020), 2020, : 100 - 107
  • [34] A Countermeasure Method Using Poisonous Data Against Poisoning Attacks on IoT Machine Learning
    Chiba, Tomoki
    Sei, Yuichi
    Tahara, Yasuyuki
    Ohsuga, Akihiko
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2021, 15 (02) : 215 - 240
  • [35] Model poisoning attacks against distributed machine learning systems
    Tomsett, Richard
    Chan, Kevin
    Chakraborty, Supriyo
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS, 2019, 11006
  • [36] Detecting Generic Network Intrusion Attacks using Tree-based Machine Learning Methods
    Alsariera, Yazan Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (02) : 597 - 603
  • [37] Data Poisoning Attacks against Autoencoder-based Anomaly Detection Models: a Robustness Analysis
    Bovenzi, Giampaolo
    Foggia, Alessio
    Santella, Salvatore
    Testa, Alessandro
    Persico, Valerio
    Pescape, Antonio
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 5427 - 5432
  • [38] Rigorous Evaluation of Machine Learning-based Intrusion Detection Against Adversarial Attacks
    Gungor, Onat
    Li, Elvin
    Shang, Zhengli
    Guo, Yutong
    Chen, Jing
    Davis, Johnathan
    Rosing, Tajana
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 152 - 158
  • [39] Adversarial Attacks Against Network Intrusion Detection in IoT Systems
    Qiu, Han
    Dong, Tian
    Zhang, Tianwei
    Lu, Jialiang
    Memmi, Gerard
    Qiu, Meikang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10327 - 10335
  • [40] NETWORK DATA INTRUSION DETECTION AND DATA FEATURE EXTRACTION OF ELECTROMECHANICAL FACILITIES FROM MACHINE LEARNING
    Xu, Ting
    Wang, Lijun
    Hu, Yanhong
    Tong, Xuming
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (06): : 5171 - 5183