4.7 Article

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

Journal

INFORMATION SCIENCES
Volume 239, Issue -, Pages 201-225

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2013.03.022

Keywords

Intrusion detection system; Adversarial environment; Computer security

Funding

  1. Regione Autonoma della Sardegna [FSE 2007-2013, L.R.7/2007]
  2. Regional Administration of Sardinia, Italy [CUP F71J11000690002]
  3. Tecniche Avanzate per la Rilevazione di Attacchi Informatici [PRR-MAB-A2011-19112]

Ask authors/readers for more resources

Intrusion Detection Systems (IDSs) are one of the key components for securing computing infrastructures. Their objective is to protect against attempts to violate defense mechanisms. Indeed, IDSs themselves are part of the computing infrastructure, and thus they may be attacked by the same adversaries they are designed to detect. This is a relevant aspect, especially in safety-critical environments, such as hospitals, aircrafts, nuclear power plants, etc. To the best of our knowledge, this survey is the first work to present an overview on adversarial attacks against IDSs. In particular, this paper will provide the following original contributions: (a) a general taxonomy of attack tactics against IDSs; (b) an extensive description of how such attacks can be implemented by exploiting IDS weaknesses at different abstraction levels; (c) for each attack implementation, a critical investigation of proposed solutions and open points. Finally, this paper will highlight the most promising research directions for the design of adversary-aware, harder-to-defeat IDS solutions. To this end, we leverage on our research experience in the field of intrusion detection, as well as on a thorough investigation of the relevant related works published so far. (C) 2013 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available