NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion

02/20/2020
by   Aritran Piplai, et al.
0

With the recent developments in artificial intelligence and machine learning, anomalies in network traffic can be detected using machine learning approaches. Before the rise of machine learning, network anomalies which could imply an attack, were detected using well-crafted rules. An attacker who has knowledge in the field of cyber-defence could make educated guesses to sometimes accurately predict which particular features of network traffic data the cyber-defence mechanism is looking at. With this information, the attacker can circumvent a rule-based cyber-defense system. However, after the advancements of machine learning for network anomaly, it is not easy for a human to understand how to bypass a cyber-defence system. Recently, adversarial attacks have become increasingly common to defeat machine learning algorithms. In this paper, we show that even if we build a classifier and train it with adversarial examples for network data, we can use adversarial attacks and successfully break the system. We propose a Generative Adversarial Network(GAN)based algorithm to generate data to train an efficient neural network based classifier, and we subsequently break the system using adversarial attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/18/2019

SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks

An Intrusion Detection System (IDS) is a key cybersecurity tool for netw...
research
12/10/2019

Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques

Machine learning techniques help to understand patterns of a dataset to ...
research
11/23/2021

Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS

Cyber attacks are increasing in volume, frequency, and complexity. In re...
research
08/04/2021

Semi-supervised Conditional GAN for Simultaneous Generation and Detection of Phishing URLs: A Game theoretic Perspective

Spear Phishing is a type of cyber-attack where the attacker sends hyperl...
research
03/06/2021

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Cyber-attacks continue to grow, both in terms of volume and sophisticati...
research
06/17/2021

Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

The incremental diffusion of machine learning algorithms in supporting c...
research
04/12/2022

Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS

Due to its high expressiveness and speed, Deep Learning (DL) has become ...

Please sign up or login with your details

Forgot password? Click here to reset