Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification

Journal of Information Security and Applications - Tập 72 - Trang 103398 - 2023
Andrew McCarthy1, Essam Ghadafi1, Panagiotis Andriotis1, Phil Legg1
1Computer Science Research Centre, University of the West of England, Bristol, UK

Tài liệu tham khảo

Ell, 2022 Biggio, 2018, Wild patterns: Ten years after the rise of adversarial machine learning, Pattern Recognit, 84, 317, 10.1016/j.patcog.2018.07.023 McCarthy, 2022, Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey, J Cybersecur Priv, 2, 154, 10.3390/jcp2010010 McCarthy, 2021, Feature vulnerability and robustness assessment against adversarial machine learning attacks, 1 Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R. Intriguing properties of neural networks. In: International conference on learning representations, ICLR 2014. 2014, 2nd International Conference on Learning Representations, ICLR 2014 ; Conference date: 14-04-2014 Through 16-04-2014. Papernot, 2018, Sok: Security and privacy in machine learning, 399 Zhang, 2019, Adversarial examples: Opportunities and challenges, IEEE Trans Neural Netw Learn Syst, 10.1109/TNNLS.2019.2933524 Apruzzese, 2021, Modeling realistic adversarial attacks against network intrusion detection systems, Digit Threats: Res Pract Qureshi, 2020, An adversarial approach for intrusion detection systems using Jacobian saliency map attacks (JSMA) algorithm, Computers, 9, 58, 10.3390/computers9030058 Lin, 2022, Idsgan: Generative adversarial networks for attack generation against intrusion detection, 79 Papernot, 2016 Yang, 2022 Zhang, 2012, Internet traffic classification by aggregating correlated naive bayes predictions, IEEE Trans Inf Forensics Secur, 8, 5, 10.1109/TIFS.2012.2223675 Sheatsley R, Hoak B, Pauley E, Beugin Y, Weisman MJ, McDaniel P. On the robustness of domain constraints. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security. 2021, p. 495–515. Apruzzese, 2022, The role of machine learning in cybersecurity, Digit Threats: Res Pract, 10.1145/3545574 Grosse, 2017 Nicolae, 2018 Wu, 2020, Network attacks detection methods based on deep learning techniques: a survey, Secur Commun Netw, 2020, 10.1155/2020/8872923 Tavallaee, 2009, A detailed analysis of the KDD CUP 99 data set, 1 McHugh, 2000, Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, ACM Trans Inf Syst Secur, 3, 262, 10.1145/382912.382923 Cerf, 2021, 2021 Internet perspectives, IEEE Network, 35, 3, 10.1109/MNET.2021.9355042 McKeay, 2020 SimilarWeb, 2022 Kok, 2019, A review of intrusion detection system using machine learning approach, Int J Eng Res Technol, 12, 8 Martins, 2020, Adversarial machine learning applied to intrusion and malware scenarios: a systematic review, IEEE Access, 8, 35403, 10.1109/ACCESS.2020.2974752 Gómez, 2021, Crafting adversarial samples for anomaly detectors in industrial control systems, Procedia Comput Sci, 184, 573, 10.1016/j.procs.2021.03.072 Gonzalez-Cuautle, 2020, Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets, Appl Sci, 10, 794, 10.3390/app10030794 Johnson, 2019, Survey on deep learning with class imbalance, J Big Data, 6, 1, 10.1186/s40537-019-0192-5 Sheatsley, 2020 Bai, 2021 Amer, 2019 Lillicrap, 2016, Random synaptic feedback weights support error backpropagation for deep learning, Nature Commun, 7, 1, 10.1038/ncomms13276 Metzen, 2017 Carlini N, Wagner D. Adversarial examples are not easily detected: Bypassing ten detection methods. In: Proceedings of the 10th ACM workshop on artificial intelligence and security. 2017, p. 3–14. Tramèr F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P. Ensemble adversarial training: Attacks and defenses. In: 6th international conference on learning representations, ICLR 2018. 2018. Wang S, Wang X, Zhao P, Wen W, Kaeli D, Chin P, Lin X. Defensive dropout for hardening deep neural networks under adversarial attacks. In: Proceedings of the international conference on computer-aided design. 2018, p. 1–8. Resende, 2018, A survey of random forest based methods for intrusion detection systems, ACM Comput Surv, 51, 1, 10.1145/3178582 Qian, 2020 Chollet, 2015 Pedregosa, 2011, Scikit-learn: Machine learning in python, J Mach Learn Res, 12, 2825 Sharafaldin, 2018, Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSp, 1, 108 Lashkari, 2017 Draper-Gil, 2016 Hofstede, 2011, Ethernet flow monitoring with IPFIX, 23 Engelen, 2021, Troubleshooting an intrusion detection dataset: the CICIDS2017 case study, 7 Pereira, 2021, Toward hierarchical classification of imbalanced data using random resampling algorithms, Inform Sci, 578, 344, 10.1016/j.ins.2021.07.033 Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami A. Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security. 2017, p. 506–19. Papernot, 2016, The limitations of deep learning in adversarial settings, 372 Sheatsley, 2022, Adversarial examples for network intrusion detection systems, J Comput Secur, 1 Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A. Towards Deep Learning Models Resistant to Adversarial Attacks. In: International conference on learning representations. 2018, URL. Goodfellow, 2014 Miranda, 2021 Koller D, Sahami M. Hierarchically Classifying Documents Using Very Few Words. In: Proceedings of the fourteenth international conference on machine learning. 1997, p. 170–8. Murtagh, 2014, Ward’s hierarchical agglomerative clustering method: which algorithms implement ward’s criterion?, J Classification, 31, 274, 10.1007/s00357-014-9161-z Kiritchenko, 2006, Learning and evaluation in the presence of class hierarchies: Application to text categorization, 395 Ma, 2021 Jeanneret G, Pérez JC, Arbelaez P. A Hierarchical Assessment of Adversarial Severity. In: Proceedings of the IEEE/CVF international conference on computer vision. 2021, p. 61–70. Min, 2018, Su-ids: A semi-supervised and unsupervised framework for network intrusion detection, 322 Hosseini, 2017