A Deep Learning Based Semi-Supervised Network Intrusion Detection System Robust to Adversarial Attacks

Syed Md. Mukit Rashid, Md. Toufikuzzaman, Md. Shohrab Hossain
{"title":"A Deep Learning Based Semi-Supervised Network Intrusion Detection System Robust to Adversarial Attacks","authors":"Syed Md. Mukit Rashid, Md. Toufikuzzaman, Md. Shohrab Hossain","doi":"10.1145/3629188.3629189","DOIUrl":null,"url":null,"abstract":"Network intrusion detection systems (NIDS) are used to detect abnormal behavior in network traffic, which is vital for secure communication. Recently, deep learning based solutions have been adopted for NIDS which suffer from two main problems. Most of them are based on supervised learning and cannot utilize the information that can be obtained from unlabeled data. Also, deep learning based methods are shown to be vulnerable to adversarial attacks. In this paper, we propose a novel semi-supervised and adversarially robust deep learning based approach which can utilize both labeled and unlabeled training samples. Our IDS first performs K-Means clustering to soft label part of the unlabeled data and then obtain a decision tree based on labeled and soft labeled samples. It then pretrains an autoencoder based multi-layer perceptron and later learns separate multi-layer perceptrons on each individual leaf of the decision tree. Our results show that the performance of our system is comparable to state-of-the art supervised learning approaches and outperforms existing state-of-the-art semi-supervised NIDS. Furthermore, we have extensively tested the adversarial robustness of our method using the popular blackbox Fast Gradient Sign Method (FGSM) and Generative Adversarial Network based IDSGAN approaches. Comparisons with other state-of-the-art NIDS baselines show that our proposed mechanism provides significantly higher adversarial detection rates, proving the robustness of our system to adversarial attacks.","PeriodicalId":508572,"journal":{"name":"Proceedings of the 10th International Conference on Networking, Systems and Security","volume":"45 11","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 10th International Conference on Networking, Systems and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3629188.3629189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Network intrusion detection systems (NIDS) are used to detect abnormal behavior in network traffic, which is vital for secure communication. Recently, deep learning based solutions have been adopted for NIDS which suffer from two main problems. Most of them are based on supervised learning and cannot utilize the information that can be obtained from unlabeled data. Also, deep learning based methods are shown to be vulnerable to adversarial attacks. In this paper, we propose a novel semi-supervised and adversarially robust deep learning based approach which can utilize both labeled and unlabeled training samples. Our IDS first performs K-Means clustering to soft label part of the unlabeled data and then obtain a decision tree based on labeled and soft labeled samples. It then pretrains an autoencoder based multi-layer perceptron and later learns separate multi-layer perceptrons on each individual leaf of the decision tree. Our results show that the performance of our system is comparable to state-of-the art supervised learning approaches and outperforms existing state-of-the-art semi-supervised NIDS. Furthermore, we have extensively tested the adversarial robustness of our method using the popular blackbox Fast Gradient Sign Method (FGSM) and Generative Adversarial Network based IDSGAN approaches. Comparisons with other state-of-the-art NIDS baselines show that our proposed mechanism provides significantly higher adversarial detection rates, proving the robustness of our system to adversarial attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于深度学习的半监督网络入侵检测系统可抵御对抗性攻击
网络入侵检测系统(NIDS)用于检测网络流量中的异常行为,这对安全通信至关重要。最近,网络入侵检测系统采用了基于深度学习的解决方案,但这些方案存在两个主要问题。它们大多基于监督学习,无法利用从无标记数据中获取的信息。此外,基于深度学习的方法容易受到对抗性攻击。在本文中,我们提出了一种新颖的基于半监督和对抗性鲁棒深度学习的方法,它可以同时利用标记和未标记的训练样本。我们的 IDS 首先执行 K-Means 聚类,对部分未标记数据进行软标记,然后基于已标记和软标记样本获得决策树。然后,它对基于自动编码器的多层感知器进行预训练,之后在决策树的每一片叶子上学习单独的多层感知器。我们的研究结果表明,我们系统的性能可与最先进的监督学习方法相媲美,并优于现有最先进的半监督 NIDS。此外,我们还使用流行的黑盒快速梯度符号法(FGSM)和基于生成对抗网络的 IDSGAN 方法广泛测试了我们方法的对抗鲁棒性。与其他最先进的 NIDS 基线进行比较后发现,我们提出的机制能显著提高对抗性检测率,证明了我们的系统对对抗性攻击的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Improving MaxSAT-Reordered Plans via Block Deordering A Deep Learning Based Semi-Supervised Network Intrusion Detection System Robust to Adversarial Attacks Delay and Cost Aware Adaptive Deployment and Migration of Service Function Chains in 5G Unveiling Key Predictors for Early Heart Attack Detection using Machine Learning and Explainable AI Technique with LIME Soft-Touch or Hard-Touch: Quantifying Touches through A New System Focusing on A Pool Touchpad for Measuring Timing of Swimmers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1