Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems

03/13/2023
by   Islam Debicha, et al.
0

Nowadays, numerous applications incorporate machine learning (ML) algorithms due to their prominent achievements. However, many studies in the field of computer vision have shown that ML can be fooled by intentionally crafted instances, called adversarial examples. These adversarial examples take advantage of the intrinsic vulnerability of ML models. Recent research raises many concerns in the cybersecurity field. An increasing number of researchers are studying the feasibility of such attacks on security systems based on ML algorithms, such as Intrusion Detection Systems (IDS). The feasibility of such adversarial attacks would be influenced by various domain-specific constraints. This can potentially increase the difficulty of crafting adversarial examples. Despite the considerable amount of research that has been done in this area, much of it focuses on showing that it is possible to fool a model using features extracted from the raw data but does not address the practical side, i.e., the reverse transformation from theory to practice. For this reason, we propose a review browsing through various important papers to provide a comprehensive analysis. Our analysis highlights some challenges that have not been addressed in the reviewed papers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/12/2023

Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems

Due to the numerous advantages of machine learning (ML) algorithms, many...
research
05/08/2023

A Survey on AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: Techniques, Challenges and Opportunities

AI/ML-based intrusion detection systems (IDSs) and misbehavior detection...
research
08/13/2023

SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection

Machine Learning (ML) can be incredibly valuable to automate anomaly det...
research
06/03/2019

The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?

The holy grail of networking is to create cognitive networks that organi...
research
07/11/2022

Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems

The internet-of-Vehicle (IoV) can facilitate seamless connectivity betwe...
research
12/03/2020

Ethical Testing in the Real World: Evaluating Physical Testing of Adversarial Machine Learning

This paper critically assesses the adequacy and representativeness of ph...
research
10/23/2018

One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy

Despite the great success achieved in machine learning (ML), adversarial...

Please sign up or login with your details

Forgot password? Click here to reset