A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems

被引:0
|
作者
Monkam, Galamo F. [1 ]
De Lucia, Michael J. [2 ]
Bastian, Nathaniel D. [1 ]
机构
[1] US Mil Acad, Army Cyber Inst, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
[2] US Army Combat Capabil Dev Command, US Army Res Lab, Aberdeen Proving Ground, MD 21005 USA
关键词
Machine learning security; Data poisoning detection; Topological data analysis; Unsupervised learning; Network security; SECURITY;
D O I
10.1016/j.cose.2024.103929
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data poisoning attacks pose a significant security risk to network security software that utilizes machine learning (ML) for network intrusion detection. As network traffic continues to surge, ML becomes indispensable in detecting and characterizing malicious actors attempting to infiltrate computer networks. However, conventional ML assumes a benign environment, leaving room for adversaries to violate this assumption during the training phase. Detecting data poisoning attacks proves to be a challenging task, as attackers employ subtle alterations in the training data to create backdoors, trojans or triggers. Traditional techniques for addressing data poisoning attacks often focus only on enhancing ML model robustness rather than detecting poisoned data, necessitating the development of novel, more effective approaches. Hence, there is an urgent need to develop new methods for identifying poisoned data, ensuring the security of ML. We introduce a novel approach that harnesses the power of topological data analysis and unsupervised learning, enabling the early identification of poisoned data before training an ML model for network intrusion detection. Leveraging our approach, the extraction of topological features and subsequent application of clustering techniques leads to the creation of new clusters exclusively composed of poisoned data for removal prior to ML model training.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
    Chen, Sen
    Xue, Minhui
    Fan, Lingling
    Hao, Shuang
    Xu, Lihua
    Zhu, Haojin
    Li, Bo
    COMPUTERS & SECURITY, 2018, 73 : 326 - 344
  • [42] CCF Based System Framework In Federated Learning Against Data Poisoning Attacks
    Ahmed, Ibrahim M.
    Kashmoola, Manar Younis
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2023, 26 (07): : 973 - 981
  • [43] Machine Learning-Based Intrusion Detection for Rare-Class Network Attacks
    Yang, Yu
    Gu, Yuheng
    Yan, Yu
    ELECTRONICS, 2023, 12 (18)
  • [44] Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems
    Paya, Antonio
    Arroni, Sergio
    Garcia-Diaz, Vicente
    Gomez, Alberto
    COMPUTERS & SECURITY, 2024, 136
  • [45] Learning to Detect: A Data-driven Approach for Network Intrusion Detection
    Tauscher, Zachary
    Jiang, Yushan
    Zhang, Kai
    Wang, Jian
    Song, Houbing
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [46] Analysis of Machine Learning Techniques Based Intrusion Detection Systems
    Sharma, Rupam Kr.
    Kalita, Hemanta Kumar
    Borah, Parashjyoti
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 485 - 493
  • [47] Topological data analysis and machine learning
    Leykam, Daniel
    Angelakis, Dimitris G.
    ADVANCES IN PHYSICS-X, 2023, 8 (01):
  • [48] CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data Generation
    Feng, Shu
    Gao, Luhan
    Shi, Leyi
    APPLIED SCIENCES-BASEL, 2025, 15 (05):
  • [49] Deep behavioral analysis of machine learning algorithms against data poisoning
    Paracha, Anum
    Arshad, Junaid
    Ben Farah, Mohamed
    Ismail, Khalid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [50] Parameterizing poisoning attacks in federated learning-based intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,