Intrusion detection systems vulnerability on adversarial examples
Title | Intrusion detection systems vulnerability on adversarial examples |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Warzyński, A., Kołaczek, G. |
Conference Name | 2018 Innovations in Intelligent Systems and Applications (INISTA) |
ISBN Number | 978-1-5386-5150-6 |
Keywords | adversarial examples, anomaly detection, anomaly detection systems ability, anomaly-based intrusion detection, attack vector, Biological neural networks, Classification algorithms, compositionality, Human Behavior, Intrusion detection, Intrusion Detection Systems, intrusion detection systems vulnerability, Metrics, Neurons, pubcrawl, Resiliency, security events, security of data, Training, vulnerability detection |
Abstract | Intrusion detection systems define an important and dynamic research area for cybersecurity. The role of Intrusion Detection System within security architecture is to improve a security level by identification of all malicious and also suspicious events that could be observed in computer or network system. One of the more specific research areas related to intrusion detection is anomaly detection. Anomaly-based intrusion detection in networks refers to the problem of finding untypical events in the observed network traffic that do not conform to the expected normal patterns. It is assumed that everything that is untypical/anomalous could be dangerous and related to some security events. To detect anomalies many security systems implements a classification or clustering algorithms. However, recent research proved that machine learning models might misclassify adversarial events, e.g. observations which were created by applying intentionally non-random perturbations to the dataset. Such weakness could increase of false negative rate which implies undetected attacks. This fact can lead to one of the most dangerous vulnerabilities of intrusion detection systems. The goal of the research performed was verification of the anomaly detection systems ability to resist this type of attack. This paper presents the preliminary results of tests taken to investigate existence of attack vector, which can use adversarial examples to conceal a real attack from being detected by intrusion detection systems. |
URL | https://ieeexplore.ieee.org/document/8466271 |
DOI | 10.1109/INISTA.2018.8466271 |
Citation Key | warzynski_intrusion_2018 |
- Intrusion Detection Systems
- vulnerability detection
- Training
- security of data
- security events
- Resiliency
- pubcrawl
- Neurons
- Metrics
- intrusion detection systems vulnerability
- adversarial examples
- Intrusion Detection
- Human behavior
- Compositionality
- Classification algorithms
- Biological neural networks
- attack vector
- anomaly-based intrusion detection
- anomaly detection systems ability
- Anomaly Detection