Fooling intrusion detection systems using adversarially autoencoder

نویسندگان

چکیده

Due to the increasing cyber-attacks, various Intrusion Detection Systems (IDSs) have been proposed identify network anomalies. Most existing machine learning-based IDSs learn patterns from features extracted traffic flows, and deep approaches can data distribution raw differentiate normal anomalous flows. Although having used in real world widely, above methods are vulnerable some types of attacks. In this paper, we propose a novel attack framework, Anti-Intrusion AutoEncoder (AIDAE), generate disable IDS. an encoder transforms into latent space, multiple decoders reconstruct continuous discrete features, respectively. Additionally, generative adversarial is flexible prior space. The correlation between be kept by using training scheme. Experiments conducted on NSL-KDD, UNSW-NB15, CICIDS2017 datasets show that generated indeed degrade detection performance dramatically.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adversarially Regularized Graph Autoencoder

Graph embedding is an e‚ective method to represent graph data in a low dimensional space for graph analytics. Most existing embedding algorithms typically focus on preserving the topological structure or minimizing the reconstruction errors of graph data, but they have mostly ignored the data distribution of the latent codes from the graphs, which o‰en results in inferior embedding in real-worl...

متن کامل

Paraphrase Detection Using Recursive Autoencoder

In this paper, we tackle the paraphrase detection task. We present a novel recursive autoencoder architecture that learns representations of phrases in an unsupervised way. Using these representations, we are able to extract features for classification algorithms that allow us to outperform many results from previous works.

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

Improving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering

Recently by developing the technology, the number of network-based servicesis increasing, and sensitive information of users is shared through the Internet.Accordingly, large-scale malicious attacks on computer networks could causesevere disruption to network services so cybersecurity turns to a major concern fornetworks. An intrusion detection system (IDS) could be cons...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Communications and Networks

سال: 2021

ISSN: ['2468-5925', '2352-8648']

DOI: https://doi.org/10.1016/j.dcan.2020.11.001