4.4 Article

Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers

Journal

COMPUTER JOURNAL
Volume -, Issue -, Pages -

Publisher

OXFORD UNIV PRESS
DOI: 10.1093/comjnl/bxad014

Keywords

adversarial attack; evasion attack; generative adversarial network; network intrusion detection systems; network security

Ask authors/readers for more resources

This paper studies adversarial attacks on network intrusion detection systems (IDSs) based on deep or machine learning algorithms. It proposes the concept of flow containers to model packets in a flow and introduces a generative adversarial network framework with dual adversarial training to produce adversarial flow containers. The experiments on different datasets show that the proposed adversarial examples have the highest evasion rates among all tested classifiers.
This paper studies adversarial attacks on network intrusion detection systems (IDSs) based on deep or machine learning algorithms. Adversarial attacks on network IDSs must maintain the functional logic of the attack flow. To prevent the produced adversarial examples from violating the attack behavior, most solutions define some limited modification actions. The result limits the production of adversarial examples, and the produced adversarial examples are not guaranteed to find the attack packets. This paper proposes the concept of flow containers to model packets in a flow. Then, we propose a generative adversarial network framework with dual adversarial training to train the generator to produce adversarial flow containers. Flow containers can correlate attack packets and feature vectors of attack flows. We test the evasion rate of the produced adversarial examples using 12 deep and machine learning algorithms. For experiments on the CTU42 data set, the proposed adversarial examples have the highest evasion rates among all 12 classifiers, with the highest evasion rate as high as 1.00. For experiments on the CIC-IDS2017 data set, the proposed adversarial examples have the highest evasion rate among the five classifiers, and the highest evasion rate is also up to 1.00.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available