Fooling intrusion detection systems using adversarially autoencoder
نویسندگان
چکیده
Due to the increasing cyber-attacks, various Intrusion Detection Systems (IDSs) have been proposed identify network anomalies. Most existing machine learning-based IDSs learn patterns from features extracted traffic flows, and deep approaches can data distribution raw differentiate normal anomalous flows. Although having used in real world widely, above methods are vulnerable some types of attacks. In this paper, we propose a novel attack framework, Anti-Intrusion AutoEncoder (AIDAE), generate disable IDS. an encoder transforms into latent space, multiple decoders reconstruct continuous discrete features, respectively. Additionally, generative adversarial is flexible prior space. The correlation between be kept by using training scheme. Experiments conducted on NSL-KDD, UNSW-NB15, CICIDS2017 datasets show that generated indeed degrade detection performance dramatically.
منابع مشابه
Adversarially Regularized Graph Autoencoder
Graph embedding is an eective method to represent graph data in a low dimensional space for graph analytics. Most existing embedding algorithms typically focus on preserving the topological structure or minimizing the reconstruction errors of graph data, but they have mostly ignored the data distribution of the latent codes from the graphs, which oen results in inferior embedding in real-worl...
متن کاملParaphrase Detection Using Recursive Autoencoder
In this paper, we tackle the paraphrase detection task. We present a novel recursive autoencoder architecture that learns representations of phrases in an unsupervised way. Using these representations, we are able to extract features for classification algorithms that allow us to outperform many results from previous works.
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملImproving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering
Recently by developing the technology, the number of network-based servicesis increasing, and sensitive information of users is shared through the Internet.Accordingly, large-scale malicious attacks on computer networks could causesevere disruption to network services so cybersecurity turns to a major concern fornetworks. An intrusion detection system (IDS) could be cons...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Communications and Networks
سال: 2021
ISSN: ['2468-5925', '2352-8648']
DOI: https://doi.org/10.1016/j.dcan.2020.11.001