Back to Search Start Over

VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems.

Authors :
Liu, Guangrui
Zhang, Weizhe
Li, Xinjie
Fan, Kaisheng
Yu, Shui
Source :
SCIENCE CHINA Information Sciences; Jul2022, Vol. 65 Issue 7, p1-18, 18p
Publication Year :
2022

Abstract

Machine learning-based network intrusion detection systems (ML-NIDS) are extensively used for network security against unknown attacks. Existing intrusion detection systems can effectively defend traditional network attacks, however, they face AI based threats. The current known AI attacks cannot balance the escape rate and attack effectiveness. In addition, the time cost of existing AI attacks is very high. In this paper, we propose a backdoor attack called VulnerGAN, which features high concealment, high aggressiveness, and high timeliness. The backdoor can make the specific attack traffic bypass the detection of ML-NIDS without affecting the performance of ML-NIDS in identifying other attack traffic. VulnerGAN uses generative adversarial networks (GAN) to calculate poisoning and adversarial samples based on machine learning model vulnerabilities. It can make traditional network attack traffic escape black-box online ML-NIDS. At the same time, model extraction and fuzzing test are used to enhance the convergence of VulnerGAN. Compared with the state-of-the-art algorithms, the VulnerGAN backdoor attack increases 33.28% in concealment, 18.48% in aggressiveness, and 46.32% in timeliness. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
1674733X
Volume :
65
Issue :
7
Database :
Complementary Index
Journal :
SCIENCE CHINA Information Sciences
Publication Type :
Academic Journal
Accession number :
157782290
Full Text :
https://doi.org/10.1007/s11432-021-3455-1