Abstract
Adversarial machine learning is a recent area of study that explores both adversarial attack strategy and detection systems of adversarial attacks, which are inputs specially crafted to outwit the classification of detection systems or disrupt the training process of detection systems. In this research, we performed two adversarial attack scenarios, we used a Generative Adversarial Network (GAN) to generate synthetic intrusion traffic to test the influence of these attacks on the accuracy of machine learning-based Intrusion Detection Systems(IDSs). We conducted two experiments on adversarial attacks including poisoning and evasion attacks on two different types of machine learning models: Decision Tree and Logistic Regression. The performance of implemented adversarial attack scenarios was evaluated using the CICIDS2017 dataset. Also, it was based on a comparison of the accuracy of machine learning-based IDS before and after attacks. The results show that the proposed evasion attacks reduced the testing accuracy of both network intrusion detection systems models (NIDS). That illustrates our evasion attack scenario negatively affected the accuracy of machine learning-based network intrusion detection systems, whereas the decision tree model was more affected than logistic regression. Furthermore, our poisoning attack scenario disrupted the training process of machine learning-based NIDS, whereas the logistic regression model was more affected than the decision tree.
Funder
The Deanship of Scientific Research (DSR) at King Abdulaziz University
Publisher
Public Library of Science (PLoS)
Reference35 articles.
1. Introduction to Artificial Intelligence for Security Professionals;D. Team;Irvine,2017
2. A taxonomy and terminology of adversarial machine learning;E. Tabassi;NIST IR,2019
3. A taxonomy and survey of attacks against machine learning;N. Pitropakis;Computer Science Review,2019
4. Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
5. Adversarial machine learning attacks and defense methods in the cyber security domain;I. Rosenberg;ACM Computing Surveys (CSUR),2021
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献