2023
DOI: 10.36227/techrxiv.21961568.v2
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Bringing To Light: Adversarial Poisoning Detection in Multi-controller Software-defined Networks

Abstract: <p>Machine learning (ML)-based network intrusion detection systems (NIDS) have become a contemporary approach to efficiently protect network communications from cyber attacks. However, ML models can become exploited by adversarial poisonings, like random label manipulation (RLM), which can compromise multi-controller software-defined network (MSDN) operations. In this paper, we develop the Trans-controller Adversarial Perturbation Detection (TAPD) framework for NIDS in multi-controller SDN setups. The de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…To address the circumvention of traditional solutions, modern solutions have also been developed to address the limitations [13] [14] [15]. In [13], the authors propose a novel detection technique called AWFC which detects adversarial perturbations by identifying the difference of classes in the data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To address the circumvention of traditional solutions, modern solutions have also been developed to address the limitations [13] [14] [15]. In [13], the authors propose a novel detection technique called AWFC which detects adversarial perturbations by identifying the difference of classes in the data.…”
Section: Related Workmentioning
confidence: 99%
“…A more well-rounded solution would be to evaluate the adversarial inconsistencies from a multi-classifier POV. In [15], the authors developed the TAPD framework to detect adversarial perturbations by performing periodic transference of the classifiers to other computing environments, thereby using local and diverse datasets to find any inconsistencies. The solution, however, includes the usage of multiple computing environments and hence, increases the attack surface for adversarial attacks.…”
Section: Related Workmentioning
confidence: 99%