Journal
INFORMATION SCIENCES
Volume 239, Issue -, Pages 201-225Publisher
ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2013.03.022
Keywords
Intrusion detection system; Adversarial environment; Computer security
Categories
Funding
- Regione Autonoma della Sardegna [FSE 2007-2013, L.R.7/2007]
- Regional Administration of Sardinia, Italy [CUP F71J11000690002]
- Tecniche Avanzate per la Rilevazione di Attacchi Informatici [PRR-MAB-A2011-19112]
Ask authors/readers for more resources
Intrusion Detection Systems (IDSs) are one of the key components for securing computing infrastructures. Their objective is to protect against attempts to violate defense mechanisms. Indeed, IDSs themselves are part of the computing infrastructure, and thus they may be attacked by the same adversaries they are designed to detect. This is a relevant aspect, especially in safety-critical environments, such as hospitals, aircrafts, nuclear power plants, etc. To the best of our knowledge, this survey is the first work to present an overview on adversarial attacks against IDSs. In particular, this paper will provide the following original contributions: (a) a general taxonomy of attack tactics against IDSs; (b) an extensive description of how such attacks can be implemented by exploiting IDS weaknesses at different abstraction levels; (c) for each attack implementation, a critical investigation of proposed solutions and open points. Finally, this paper will highlight the most promising research directions for the design of adversary-aware, harder-to-defeat IDS solutions. To this end, we leverage on our research experience in the field of intrusion detection, as well as on a thorough investigation of the relevant related works published so far. (C) 2013 Elsevier Inc. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available