Aldhaheri Sahar, Alhuzali Abeer
Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia.
Sensors (Basel). 2023 Sep 11;23(18):7796. doi: 10.3390/s23187796.
In cybersecurity, a network intrusion detection system (NIDS) is a critical component in networks. It monitors network traffic and flags suspicious activities. To effectively detect malicious traffic, several detection techniques, including machine learning-based NIDSs (ML-NIDSs), have been proposed and implemented. However, in much of the existing ML-NIDS research, the experimental settings do not accurately reflect real-world scenarios where new attacks are constantly emerging. Thus, the robustness of intrusion detection systems against zero-day and adversarial attacks is a crucial area that requires further investigation. In this paper, we introduce and develop a framework named SGAN-IDS. This framework constructs adversarial attack flows designed to evade detection by five BlackBox ML-based IDSs. SGAN-IDS employs generative adversarial networks and self-attention mechanisms to generate synthetic adversarial attack flows that are resilient to detection. Our evaluation results demonstrate that SGAN-IDS has successfully constructed adversarial flows for various attack types, reducing the detection rate of all five IDSs by an average of 15.93%. These findings underscore the robustness and broad applicability of the proposed model.
在网络安全领域,网络入侵检测系统(NIDS)是网络中的关键组件。它监控网络流量并标记可疑活动。为了有效检测恶意流量,已经提出并实施了多种检测技术,包括基于机器学习的NIDS(ML-NIDS)。然而,在现有的许多ML-NIDS研究中,实验设置并不能准确反映新攻击不断出现的现实世界场景。因此,入侵检测系统针对零日攻击和对抗性攻击的鲁棒性是一个需要进一步研究的关键领域。在本文中,我们介绍并开发了一个名为SGAN-IDS的框架。该框架构建旨在逃避五个基于黑盒ML的IDS检测的对抗性攻击流。SGAN-IDS采用生成对抗网络和自注意力机制来生成对检测具有弹性的合成对抗性攻击流。我们的评估结果表明,SGAN-IDS已成功为各种攻击类型构建了对抗性流,并将所有五个IDS的检测率平均降低了15.93%。这些发现强调了所提出模型的鲁棒性和广泛适用性。