Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach

被引:0
|
作者
Li, Xiping [1 ]
Dong, Wei [1 ]
Sun, Yi [2 ]
Chen, Shaolong [1 ]
Kong, Detong [1 ]
Yang, Shujie [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Natl Pilot Software Engn Sch, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Shenzhen Inst, Shenzhen 518000, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Adversarial attack; Generative adversarial networks; Intrusion detection systems; Black-box attack; PREDICTION;
D O I
10.1109/IWCMC61514.2024.10592493
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection Systems (IDS) are essential tools in network security, which aims to identify malicious traffic to safeguard computers. In recent years, with the application and advancement of machine learning in fields such as image recognition, autonomous driving, and natural language processing (NLP), machine learning-based intrusion detection systems have also rapidly developed. Unfortunately, such IDSs exhibit poor defensive capabilities when facing carefully crafted and imperceptible adversarial attacks. Adversarial attacks manipulate adversarial samples, causing malicious traffic to be misclassified as normal traffic, thereby bypassing intrusion detection systems. Given that adversarial attacks on IDSs in the real world largely operate under the premise of model agnosticism, this paper proposes a black-box attack based on Generative Adversarial Networks (GANs) and active learning. During the iterative training of GANs, the discriminator is covertly constructed as a shadow model of the target IDS, and a generator capable of generating adversarial malicious traffic is trained. Finally, leveraging the transferability of adversarial attacks to DNN, the attack implemented on the shadow model is transferred to the target model, thereby attacking the intrusion detector. Unlike adversarial attacks against image classifiers, adversarial attacks against IDSs must also consider whether the added adversarial perturbations will affect the semantics and functionality of the original malicious traffic. Therefore, the constraint mechanism for modifying feature values is also an important consideration in this paper.
引用
收藏
页码:1364 / 1369
页数:6
相关论文
共 50 条
  • [1] Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware
    Demetrio, Luca
    Biggio, Battista
    Lagorio, Giovanni
    Roli, Fabio
    Armando, Alessandro
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3469 - 3478
  • [2] On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks
    Choi, Jeongseok
    Kim, Hyoungshick
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 39 - 50
  • [3] Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier
    Kulikov, D. A.
    Platonov, V. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1080 - 1086
  • [4] Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier
    D. A. Kulikov
    V. V. Platonov
    Automatic Control and Computer Sciences, 2021, 55 : 1080 - 1086
  • [5] Adversarial Attacks Against Network Intrusion Detection in IoT Systems
    Qiu, Han
    Dong, Tian
    Zhang, Tianwei
    Lu, Jialiang
    Memmi, Gerard
    Qiu, Meikang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10327 - 10335
  • [6] Adversarial Attack Detection Approach for Intrusion Detection Systems
    Degirmenci, Elif
    Ozcelik, Ilker
    Yazici, Ahmet
    IEEE ACCESS, 2024, 12 : 195996 - 196009
  • [7] Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
    Usama, Muhammad
    Asim, Muhammad
    Latif, Siddique
    Qadir, Junaid
    Ala-Al-Fuqaha
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 78 - 83
  • [8] Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning
    Yang, Ziyuan
    Qu, Haipeng
    Hua, Ying
    Zhang, Xiaoshuai
    Lin, Xijun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 146 - 157
  • [9] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [10] Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
    Apruzzese, Giovanni
    Andreolini, Mauro
    Ferretti, Luca
    Marchetti, Mirco
    Colajanni, Michele
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03):