Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems

对抗制 僵尸网络 计算机科学 逃避(道德) 入侵检测系统 计算机安全 脆弱性(计算) 领域(数学) 恶意软件 对抗性机器学习 多样性(控制论) 人工智能 网络安全 方案(数学) 机器学习 互联网 万维网 生物 数学 数学分析 纯数学 免疫学 免疫系统
作者
Islam Debicha,Benjamin Cochez,Tayeb Kenaza,Thibault Debatty,Jean‐Michel Dricot,Wim Mees
出处
期刊:Computers & Security [Elsevier BV]
卷期号:129: 103176-103176 被引量:18
标识
DOI:10.1016/j.cose.2023.103176
摘要

Due to the numerous advantages of machine learning (ML) algorithms, many applications now incorporate them. However, many studies in the field of image classification have shown that MLs can be fooled by a variety of adversarial attacks. These attacks take advantage of ML algorithms’ inherent vulnerability. This raises many questions in the cybersecurity field, where a growing number of researchers are recently investigating the feasibility of such attacks against machine learning-based security systems, such as intrusion detection systems. The majority of this research demonstrates that it is possible to fool a model using features extracted from a raw data source, but it does not take into account the real implementation of such attacks, i.e., the reverse transformation from theory to practice. The real implementation of these adversarial attacks would be influenced by various constraints that would make their execution more difficult. As a result, the purpose of this study was to investigate the actual feasibility of adversarial attacks, specifically evasion attacks, against network-based intrusion detection systems (NIDS), demonstrating that it is entirely possible to fool these ML-based IDSs using our proposed adversarial algorithm while assuming as many constraints as possible in a black-box setting. In addition, since it is critical to design defense mechanisms to protect ML-based IDSs against such attacks, a defensive scheme is presented. Realistic botnet traffic traces are used to assess this work. Our goal is to create adversarial botnet traffic that can avoid detection while still performing all of its intended malicious functionality.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
慕青应助123采纳,获得10
1秒前
fst发布了新的文献求助10
2秒前
3秒前
wayne完成签到,获得积分10
3秒前
夏姬宁静发布了新的文献求助10
5秒前
沛蓝完成签到,获得积分10
5秒前
东东子完成签到 ,获得积分10
7秒前
8秒前
ly完成签到,获得积分10
12秒前
木子林希儿完成签到,获得积分10
12秒前
llll发布了新的文献求助10
13秒前
13秒前
李爱国应助LL采纳,获得30
13秒前
东东子关注了科研通微信公众号
14秒前
太阳娃娃完成签到,获得积分10
14秒前
时光完成签到,获得积分0
14秒前
自信谷冬完成签到,获得积分10
16秒前
zhouxianhuan发布了新的文献求助10
16秒前
16秒前
夏姬宁静完成签到,获得积分10
17秒前
Xian完成签到,获得积分10
19秒前
m(_._)m完成签到 ,获得积分0
22秒前
yolo完成签到 ,获得积分10
22秒前
淡定的水杯完成签到,获得积分10
23秒前
23秒前
李天王完成签到,获得积分10
26秒前
谨慎乌完成签到,获得积分10
27秒前
28秒前
nove999完成签到 ,获得积分0
28秒前
科研通AI2S应助科研通管家采纳,获得10
29秒前
乐乐应助科研通管家采纳,获得10
29秒前
29秒前
香蕉觅云应助科研通管家采纳,获得10
29秒前
张菁完成签到,获得积分10
30秒前
慕青应助科研通管家采纳,获得10
30秒前
wy.he应助科研通管家采纳,获得60
30秒前
闪闪易烟应助科研通管家采纳,获得10
30秒前
桐桐应助科研通管家采纳,获得10
30秒前
Hello应助科研通管家采纳,获得10
30秒前
30秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
PowerCascade: A Synthetic Dataset for Cascading Failure Analysis in Power Systems 2000
Various Faces of Animal Metaphor in English and Polish 800
Signals, Systems, and Signal Processing 610
Adverse weather effects on bus ridership 500
Photodetectors: From Ultraviolet to Infrared 500
On the Dragon Seas, a sailor's adventures in the far east 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6350985
求助须知:如何正确求助?哪些是违规求助? 8165560
关于积分的说明 17183567
捐赠科研通 5407103
什么是DOI,文献DOI怎么找? 2862810
邀请新用户注册赠送积分活动 1840361
关于科研通互助平台的介绍 1689515