Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS

04/12/2022
by   Ke He, et al.
0

Due to its high expressiveness and speed, Deep Learning (DL) has become an increasingly popular choice as the detection algorithm for Network-based Intrusion Detection Systems (NIDSes). Unfortunately, DL algorithms are vulnerable to adversarial examples that inject imperceptible modifications to the input and cause the DL algorithm to misclassify the input. Existing adversarial attacks in the NIDS domain often manipulate the traffic features directly, which hold no practical significance because traffic features cannot be replayed in a real network. It remains a research challenge to generate practical and evasive adversarial attacks. This paper presents the Liuer Mihou attack that generates practical and replayable adversarial network packets that can bypass anomaly-based NIDS deployed in the Internet of Things (IoT) networks. The core idea behind Liuer Mihou is to exploit adversarial transferability and generate adversarial packets on a surrogate NIDS constrained by predefined mutation operations to ensure practicality. We objectively analyse the evasiveness of Liuer Mihou against four ML-based algorithms (LOF, OCSVM, RRCF, and SOM) and the state-of-the-art NIDS, Kitsune. From the results of our experiment, we gain valuable insights into necessary conditions on the adversarial transferability of anomaly detection algorithms. Going beyond a theoretical setting, we replay the adversarial attack in a real IoT testbed to examine the practicality of Liuer Mihou. Furthermore, we demonstrate that existing feature-level adversarial defence cannot defend against Liuer Mihou and constructively criticise the limitations of feature-level adversarial defences.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/22/2021

Detect Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

In the last decade, the use of Machine Learning techniques in anomaly-ba...
research
05/15/2020

Practical Traffic-space Adversarial Attacks on Learning-based NIDSs

Machine learning (ML) techniques have been increasingly used in anomaly-...
research
08/13/2023

SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection

Machine Learning (ML) can be incredibly valuable to automate anomaly det...
research
09/21/2020

Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)

In manufacturing, unexpected failures are considered a primary operation...
research
04/12/2023

Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things

While the benefits of 6G-enabled Internet of Things (IoT) are numerous, ...
research
02/20/2020

NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion

With the recent developments in artificial intelligence and machine lear...
research
09/02/2020

Flow-based detection and proxy-based evasion of encrypted malware C2 traffic

State of the art deep learning techniques are known to be vulnerable to ...

Please sign up or login with your details

Forgot password? Click here to reset