Robustness of ML-Enhanced IDS to Stealthy Adversaries

04/21/2021
by   Vance Wong, et al.
0

Intrusion Detection Systems (IDS) enhanced with Machine Learning (ML) have demonstrated the capacity to efficiently build a prototype of "normal" cyber behaviors in order to detect cyber threats' activity with greater accuracy than traditional rule-based IDS. Because these are largely black boxes, their acceptance requires proof of robustness to stealthy adversaries. Since it is impossible to build a baseline from activity completely clean of that of malicious cyber actors (outside of controlled experiments), the training data for deployed models will be poisoned with examples of activity that analysts would want to be alerted about. We train an autoencoder-based anomaly detection system on network activity with various proportions of malicious activity mixed in and demonstrate that they are robust to this sort of poisoning.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/27/2021

End-To-End Anomaly Detection for Identifying Malicious Cyber Behavior through NLP-Based Log Embeddings

Rule-based IDS (intrusion detection systems) are being replaced by more ...
research
09/14/2023

Malicious Cyber Activity Detection Using Zigzag Persistence

In this study we synthesize zigzag persistence from topological data ana...
research
08/09/2020

Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems

The increase of cyber attacks in both the numbers and varieties in recen...
research
04/20/2022

Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems

The growing complexity of Cyber-Physical Systems (CPS) and challenges in...
research
11/08/2022

A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System

Network intrusion detection systems (NIDS) to detect malicious attacks c...
research
10/23/2020

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Network intrusion detection (NID) is an essential defense strategy that ...
research
03/24/2022

Email Summarization to Assist Users in Phishing Identification

Cyber-phishing attacks recently became more precise, targeted, and tailo...

Please sign up or login with your details

Forgot password? Click here to reset