2022
DOI: 10.48550/arxiv.2203.06694
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN

Abstract: Network intrusion detection systems (NIDS) are an essential defense for computer networks and the hosts within them. Machine learning (ML) nowadays predominantly serves as the basis for NIDS decision making, where models are tuned to reduce false alarms, increase detection rates, and detect known and unknown attacks. At the same time, ML models have been found to be vulnerable to adversarial examples that undermine the downstream task. In this work, we ask the practical question of whether real-world MLbased N… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 30 publications
1
4
0
Order By: Relevance
“…After conducting experiments, it was necessary to compare our results with the results of existing studies and models to show the effectiveness of our model. [26] and [28]. Compared with [18], we found some results close to our results, especially when using Genetic Attack.…”
Section: Comparison With Other Studiessupporting
confidence: 86%
See 1 more Smart Citation
“…After conducting experiments, it was necessary to compare our results with the results of existing studies and models to show the effectiveness of our model. [26] and [28]. Compared with [18], we found some results close to our results, especially when using Genetic Attack.…”
Section: Comparison With Other Studiessupporting
confidence: 86%
“…For more evasive attacks, the authors in [28] proposed NIDSGAN, a GAN-based attack method, then added new terms to the loss function. The loss function decreases the distance between the real and adversarial features and the conventional loss function, which prevents the discriminator from distinguishing between adversarial and real traffic.…”
Section: Introductionmentioning
confidence: 99%
“…It changes the following bytes from the IP header: fragmentation bytes (byte number 7 and 8), TTL byte (byte number 9), and IP checksum bytes (byte number 11 and 12). To compare the performance of our approach, we tested the perturbed samples against the packet and flow-based NIDS used in recent literature studies [51], [50], which included decision tree, random forest, support vector machine, k-nearest neighbor, and deep neural network models. The evasion rate (ER) against these ML/DL-based NIDS ranged from 70% to 99% across different attack types.…”
Section: Modifying Fragmentationmentioning
confidence: 99%
“…A few researchers began employing simple deep learning models to detect malicious traffic. Such as, AlertNet [26], DeepNet [27], and IdsNet [28] are based on fully connected perceptrons with ReLU activation functions, batch normalization to improve training performance, and dropout to prevent overfitting. For non-differentiable models, we primarily use the decision trees (DT), Random forests (RF), XGboost (Xgb.…”
Section: Classifiersmentioning
confidence: 99%