3.8 Proceedings Paper

Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network

Publisher

IEEE
DOI: 10.1109/RIVF51545.2021.9642111

Keywords

IDS; Machine Learning IDS; Generative Adversarial Networks; Adversarial Attacks

Funding

  1. Vietnam National University HoChiMinh City [DSC2021-26-05]
  2. Vingroup Joint Stock Company
  3. Vingroup Innovation Foundation (VINIF), Vingroup Big Data Institute (VINBIGDATA) [VINIF.2020.TS.138]

Ask authors/readers for more resources

A framework that generates data flow of cyberattacks capable of bypassing machine learning-based intrusion detection systems (ML-IDS) was proposed to improve the IDS's capability in detecting sophisticated attacks. By generating data flows to retrain ML-IDS, the framework enhances the robustness of IDS against attacks. Experimental results show that this method effectively improves the performance of IDS in detecting malicious attacks.
With the spread of the number of smart devices in the context of Smart City, Software Defined Networking (SDN) is considered as a vital principle to manage a large-scale heterogeneous network within centralized controller. To deal with cyberattacks against such networks, intrusion detection system (IDS) is built to recognize and alert to the system administrator for further appropriate response. Currently, machine learning-based IDS (ML-IDS) has been explored and is still being developed. However, these systems give a high rate of false alert and are easily deceived by sophisticated attacks such as variants of attacks containing perturbation. Therefore, it is necessary to continuously evaluate and improve these systems by simulating mutation of real-world network attack. Relied on the Generative Discriminative Networks (GANs), we introduce DIGFuPAS, a framework that generates data flow of cyberattacks capable of bypassing ML-IDS. It can generate malicious data streams that mutate from real attack traffic making the IDS undetectable. The generated traffic flow is used to retrain ML-IDS, for improving the robustness of IDS in detecting sophisticated attacks. The experiments are performed and evaluated through 2 criteria: Detection rate (DR) and F1 Score (F1) on the public dataset, named CICIDS2017. DIGFuPAS can be used for continuously pentesting and evaluating IDS's capability once integrated as an automated sustainability test pipeline for SDN-enabled networks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available