首页 > 最新文献

Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning最新文献

英文 中文
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning 第二届ACM无线安全和机器学习研讨会论文集
Michael Roland
{"title":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","authors":"Michael Roland","doi":"10.1145/3395352","DOIUrl":"https://doi.org/10.1145/3395352","url":null,"abstract":"","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128233390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting acoustic backdoor transmission of inaudible messages using deep learning 利用深度学习检测听不见的信息的声学后门传输
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402629
S. Kokalj-Filipovic, Morriel Kasher, Michael Zhao, P. Spasojevic
The novel secret inaudible acoustic communication channel [11], referred to as the BackDoor channel, is a method of embedding inaudible signals in acoustic data that is likely to be processed by a trained deep neural net. In this paper we perform preliminary studies of the detectability of such a communication channel by deep learning algorithms that are trained on the original acoustic data used for such a secret exploit. The BackDoor channel embeds inaudible messages by modulating them with a sinewave of 40kHz and transmitting using ultrasonic speakers. The received composite signal is used to generate the Backdoor dataset for evaluation of our neural net. The audible samples are played back and recorded as a baseline dataset for training. The Backdoor dataset is used to evaluate the impact that the BackDoor channel has on the classification of the acoustic data, and we show that the accuracy of the classifier is degraded. The degradation depends on the type of deep classifier and it appears to impact less the classifiers that are trained using autoencoders. We also propose statistics that can be used to detect the out-of-distribution samples created as a result of the BackDoor channel, such as the log likelihood of the variational autoencoder used to pre-train the classifier or the empirical entropy of the classifier's output layer. The preliminary results presented in this paper indicate that the use of deep learning classifiers as detectors of the BackDoor secret channel merits further research.
一种新型的秘密听不清声学通信信道[11],称为后门信道,是一种将听不清信号嵌入到声学数据中的方法,这些声学数据可能会被训练好的深度神经网络处理。在本文中,我们通过深度学习算法对这种通信通道的可探测性进行了初步研究,这些算法是在用于这种秘密利用的原始声学数据上进行训练的。后门通道通过用40kHz的正弦波调制并使用超声波扬声器传输来嵌入听不见的信息。接收到的复合信号用于生成后门数据集,用于评估我们的神经网络。声音样本被回放并记录为训练的基线数据集。使用Backdoor数据集来评估Backdoor通道对声学数据分类的影响,结果表明分类器的准确性降低了。退化取决于深度分类器的类型,它似乎对使用自编码器训练的分类器影响较小。我们还提出了可用于检测由于后门通道而产生的分布外样本的统计数据,例如用于预训练分类器的变分自编码器的对数似然或分类器输出层的经验熵。本文的初步结果表明,使用深度学习分类器作为后门秘密通道的检测器值得进一步研究。
{"title":"Detecting acoustic backdoor transmission of inaudible messages using deep learning","authors":"S. Kokalj-Filipovic, Morriel Kasher, Michael Zhao, P. Spasojevic","doi":"10.1145/3395352.3402629","DOIUrl":"https://doi.org/10.1145/3395352.3402629","url":null,"abstract":"The novel secret inaudible acoustic communication channel [11], referred to as the BackDoor channel, is a method of embedding inaudible signals in acoustic data that is likely to be processed by a trained deep neural net. In this paper we perform preliminary studies of the detectability of such a communication channel by deep learning algorithms that are trained on the original acoustic data used for such a secret exploit. The BackDoor channel embeds inaudible messages by modulating them with a sinewave of 40kHz and transmitting using ultrasonic speakers. The received composite signal is used to generate the Backdoor dataset for evaluation of our neural net. The audible samples are played back and recorded as a baseline dataset for training. The Backdoor dataset is used to evaluate the impact that the BackDoor channel has on the classification of the acoustic data, and we show that the accuracy of the classifier is degraded. The degradation depends on the type of deep classifier and it appears to impact less the classifiers that are trained using autoencoders. We also propose statistics that can be used to detect the out-of-distribution samples created as a result of the BackDoor channel, such as the log likelihood of the variational autoencoder used to pre-train the classifier or the empirical entropy of the classifier's output layer. The preliminary results presented in this paper indicate that the use of deep learning classifiers as detectors of the BackDoor secret channel merits further research.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A network security classifier defense: against adversarial machine learning attacks 网络安全分类器防御:对抗机器学习攻击
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402627
Michael J. De Lucia, Chase Cotton
The discovery of practical adversarial machine learning (AML) attacks against machine learning-based wired and wireless network security detectors has driven the necessity of a defense. Without a defense mechanism against AML, attacks in wired and wireless networks will go unnoticed by network security classifiers resulting in their ineffectiveness. Therefore, it is essential to motivate a defense against AML attacks for network security classifiers. Existing AML defenses are generally within the context of image recognition. However, these AML defenses have limited transferability to a network security context. Unlike image recognition, a subject matter expert generally derives the features of a network security classifier. Therefore, a network security classifier requires a distinctive strategy for defense. We propose a novel defense-in-depth approach for network security classifiers using a hierarchical ensemble of classifiers, each using a disparate feature set. Subsequently we show the effective use of our hierarchical ensemble to defend an existing network security classifier against an AML attack. Additionally, we discover a novel set of features to detect network scanning activity. Lastly, we propose to enhance our AML defense approach in future work. A shortcoming of our approach is the increased cost to the defender for implementation of each independent classifier. Therefore, we propose combining our AML defense with a moving target defense approach. Additionally, we propose to evaluate our AML defense with a variety of datasets and classifiers and evaluate the effectiveness of decomposing a classifier with many features into multiple classifiers, each with a small subset of the features.
针对基于机器学习的有线和无线网络安全探测器的实际对抗性机器学习(AML)攻击的发现,推动了防御的必要性。如果没有针对“反洗钱”的防御机制,有线和无线网络中的攻击将被网络安全分类器所忽视,导致其无效。因此,为网络安全分类器激发对反洗钱攻击的防御是至关重要的。现有的反洗钱防御通常是在图像识别的背景下。然而,这些“反洗钱”防御措施在网络安全环境中的可转移性有限。与图像识别不同,主题专家通常派生网络安全分类器的特征。因此,网络安全分类器需要一种独特的防御策略。我们提出了一种新的网络安全分类器深度防御方法,使用分类器的分层集成,每个分类器使用不同的特征集。随后,我们展示了有效地使用我们的分层集成来保护现有的网络安全分类器免受AML攻击。此外,我们发现了一组新的特征来检测网络扫描活动。最后,我们建议在未来的工作中加强我们的AML防御方法。我们方法的一个缺点是防御者实现每个独立分类器的成本增加。因此,我们建议将反洗钱防御与移动目标防御方法相结合。此外,我们建议使用各种数据集和分类器来评估我们的AML防御,并评估将具有许多特征的分类器分解为多个分类器的有效性,每个分类器具有一小部分特征。
{"title":"A network security classifier defense: against adversarial machine learning attacks","authors":"Michael J. De Lucia, Chase Cotton","doi":"10.1145/3395352.3402627","DOIUrl":"https://doi.org/10.1145/3395352.3402627","url":null,"abstract":"The discovery of practical adversarial machine learning (AML) attacks against machine learning-based wired and wireless network security detectors has driven the necessity of a defense. Without a defense mechanism against AML, attacks in wired and wireless networks will go unnoticed by network security classifiers resulting in their ineffectiveness. Therefore, it is essential to motivate a defense against AML attacks for network security classifiers. Existing AML defenses are generally within the context of image recognition. However, these AML defenses have limited transferability to a network security context. Unlike image recognition, a subject matter expert generally derives the features of a network security classifier. Therefore, a network security classifier requires a distinctive strategy for defense. We propose a novel defense-in-depth approach for network security classifiers using a hierarchical ensemble of classifiers, each using a disparate feature set. Subsequently we show the effective use of our hierarchical ensemble to defend an existing network security classifier against an AML attack. Additionally, we discover a novel set of features to detect network scanning activity. Lastly, we propose to enhance our AML defense approach in future work. A shortcoming of our approach is the increased cost to the defender for implementation of each independent classifier. Therefore, we propose combining our AML defense with a moving target defense approach. Additionally, we propose to evaluate our AML defense with a variety of datasets and classifiers and evaluate the effectiveness of decomposing a classifier with many features into multiple classifiers, each with a small subset of the features.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130079140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Data augmentation with conditional GAN for automatic modulation classification 用于自动调制分类的条件GAN数据增强
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402622
M. Patel, Xuyu Wang, S. Mao
Deep learning has great potential for automatic modulation classification (AMC). However, its performance largely hinges upon the availability of sufficient high-quality labeled data. In this paper, we propose data augmentation with conditional generative adversarial network (CGAN) for convolutional neural network (CNN) based AMC, which provides an effective solution to the limited data problem. We present the design of the proposed CGAN based data augmentation method, and validate its performance with a public dataset. The experiment results show that CNN-based modulation classification can greatly benefit from the proposed data augmentation approach with greatly improved accuracy.
深度学习在自动调制分类(AMC)方面具有巨大的潜力。然而,它的性能在很大程度上取决于是否有足够的高质量标记数据。本文针对基于卷积神经网络(CNN)的AMC,提出了一种基于条件生成对抗网络(CGAN)的数据增强方法,为有限数据问题提供了有效的解决方案。我们提出了基于CGAN的数据增强方法的设计,并用公共数据集验证了其性能。实验结果表明,本文提出的数据增强方法可以极大地提高基于cnn的调制分类精度。
{"title":"Data augmentation with conditional GAN for automatic modulation classification","authors":"M. Patel, Xuyu Wang, S. Mao","doi":"10.1145/3395352.3402622","DOIUrl":"https://doi.org/10.1145/3395352.3402622","url":null,"abstract":"Deep learning has great potential for automatic modulation classification (AMC). However, its performance largely hinges upon the availability of sufficient high-quality labeled data. In this paper, we propose data augmentation with conditional generative adversarial network (CGAN) for convolutional neural network (CNN) based AMC, which provides an effective solution to the limited data problem. We present the design of the proposed CGAN based data augmentation method, and validate its performance with a public dataset. The experiment results show that CNN-based modulation classification can greatly benefit from the proposed data augmentation approach with greatly improved accuracy.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Deep learning based wiretap coding via mutual information estimation 基于互信息估计的深度学习窃听编码
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402654
Rick Fritschek, R. Schaefer, G. Wunder
Recently, deep learning of encoding and decoding functions for wireless communication has emerged as a promising research direction and gained considerable interest due to its impressive results. A specific direction in this growing field are neural network-aided techniques that work without a fixed channel model. These approaches utilize generative adversarial networks, reinforcement learning, or mutual information estimation to overcome the need of a known channel model for training. This paper focuses on the last approach and extend it to secure channel coding schemes by sampling the legitimate channel and additionally introduce security constraints for communication. This results in a mixed optimization between the mutual information estimate, the reliability of the code and its secrecy constraint. It is believed that this lays the foundation for flexible, generalizable physical layer security approaches due to its independence of specific model assumptions.
近年来,无线通信编码和解码功能的深度学习已成为一个很有前途的研究方向,并因其令人印象深刻的成果而引起了人们的极大兴趣。在这个不断发展的领域中,一个特定的方向是神经网络辅助技术,它可以在没有固定通道模型的情况下工作。这些方法利用生成对抗网络、强化学习或互信息估计来克服对已知通道模型的训练需求。本文重点介绍了最后一种方法,并通过对合法信道进行采样,将其扩展到安全信道编码方案中,并引入了通信的安全约束。这导致了互信息估计、代码可靠性及其保密约束之间的混合优化。由于它独立于特定的模型假设,因此可以为灵活、通用的物理层安全方法奠定基础。
{"title":"Deep learning based wiretap coding via mutual information estimation","authors":"Rick Fritschek, R. Schaefer, G. Wunder","doi":"10.1145/3395352.3402654","DOIUrl":"https://doi.org/10.1145/3395352.3402654","url":null,"abstract":"Recently, deep learning of encoding and decoding functions for wireless communication has emerged as a promising research direction and gained considerable interest due to its impressive results. A specific direction in this growing field are neural network-aided techniques that work without a fixed channel model. These approaches utilize generative adversarial networks, reinforcement learning, or mutual information estimation to overcome the need of a known channel model for training. This paper focuses on the last approach and extend it to secure channel coding schemes by sampling the legitimate channel and additionally introduce security constraints for communication. This results in a mixed optimization between the mutual information estimate, the reliability of the code and its secrecy constraint. It is believed that this lays the foundation for flexible, generalizable physical layer security approaches due to its independence of specific model assumptions.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133901908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Wideband spectral monitoring using deep learning 使用深度学习的宽带频谱监测
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402620
H. Franco, Chris Cobo-Kroenke, Stephanie Welch, M. Graciarena
We present a system to perform spectral monitoring of a wide band of 666.5 MHz, located within a range of 6 GHz of Radio Frequency (RF) bandwidth, using state-of-the-art deep learning approaches. The system detects, labels, and localizes in time and frequency signals of interest (SOIs) against a background of wideband RF activity. We apply a hierarchical approach. At the lower level we use a sweeping window to analyze a wideband spectrogram, which is input to a deep convolutional network that estimates local probabilities for the presence of SOIs for each position of the window. In a subsequent, higher-level processing step, these local frame probability estimates are integrated over larger two-dimensional regions that are hypothesized by a second neural network, a region proposal network, adapted from object localization in image processing. The integrated segmental probability scores are used to detect SOIs in the hypothesized spectro-temporal regions.
我们提出了一个系统来执行频谱监测666.5 MHz的宽带,位于6ghz的射频(RF)带宽范围内,使用最先进的深度学习方法。该系统在宽带射频活动背景下检测、标记和定位感兴趣的时间和频率信号(SOIs)。我们采用分层方法。在较低的层次上,我们使用扫描窗口来分析宽带频谱图,该频谱图被输入到一个深度卷积网络中,该网络估计窗口每个位置存在SOIs的局部概率。在随后的高级处理步骤中,这些局部帧概率估计被整合到更大的二维区域上,这些二维区域是由第二个神经网络假设的,该神经网络是一个区域建议网络,适应于图像处理中的对象定位。综合片段概率分数用于在假设的光谱-时间区域检测SOIs。
{"title":"Wideband spectral monitoring using deep learning","authors":"H. Franco, Chris Cobo-Kroenke, Stephanie Welch, M. Graciarena","doi":"10.1145/3395352.3402620","DOIUrl":"https://doi.org/10.1145/3395352.3402620","url":null,"abstract":"We present a system to perform spectral monitoring of a wide band of 666.5 MHz, located within a range of 6 GHz of Radio Frequency (RF) bandwidth, using state-of-the-art deep learning approaches. The system detects, labels, and localizes in time and frequency signals of interest (SOIs) against a background of wideband RF activity. We apply a hierarchical approach. At the lower level we use a sweeping window to analyze a wideband spectrogram, which is input to a deep convolutional network that estimates local probabilities for the presence of SOIs for each position of the window. In a subsequent, higher-level processing step, these local frame probability estimates are integrated over larger two-dimensional regions that are hypothesized by a second neural network, a region proposal network, adapted from object localization in image processing. The integrated segmental probability scores are used to detect SOIs in the hypothesized spectro-temporal regions.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114527312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generalized wireless adversarial deep learning 广义无线对抗性深度学习
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402625
Francesco Restuccia, Salvatore D’oro, Amani Al-Shawabka, Bruno Costa Rendon, K. Chowdhury, Stratis Ioannidis, T. Melodia
Deep learning techniques can classify spectrum phenomena (e.g., waveform modulation) with accuracy levels that were once thought impossible. Although we have recently seen many advances in this field, extensive work in computer vision has demonstrated that an adversary can "crack" a classifier by designing inputs that "steer" the classifier away from the ground truth. This paper advances the state of the art by proposing a generalized analysis and evaluation of adversarial machine learning (AML) attacks to deep learning systems in the wireless domain. We postulate a series of adversarial attacks, and formulate a Generalized Wireless Adversarial Machine Learning Problem (GWAP) where we analyze the combined effect of the wireless channel and the adversarial waveform on the efficacy of the attacks. We extensively evaluate the performance of our attacks on a state-of-the-art 1,000-device radio fingerprinting dataset, and a 24-class modulation dataset. Results show that our algorithms can decrease the classifiers' accuracy up to 3x while keeping the waveform distortion to a minimum.
深度学习技术可以对频谱现象(例如,波形调制)进行分类,其精确度一度被认为是不可能的。尽管我们最近在这一领域看到了许多进展,但计算机视觉领域的大量工作已经表明,对手可以通过设计“引导”分类器偏离基本事实的输入来“破解”分类器。本文提出了一种针对无线领域深度学习系统的对抗性机器学习(AML)攻击的广义分析和评估,从而提高了目前的技术水平。我们假设了一系列对抗性攻击,并制定了一个广义无线对抗性机器学习问题(GWAP),其中我们分析了无线信道和对抗性波形对攻击有效性的综合影响。我们在最先进的1000个设备的无线电指纹数据集和24类调制数据集上广泛评估了我们的攻击性能。结果表明,我们的算法可以将分类器的准确率降低3倍,同时保持波形失真最小。
{"title":"Generalized wireless adversarial deep learning","authors":"Francesco Restuccia, Salvatore D’oro, Amani Al-Shawabka, Bruno Costa Rendon, K. Chowdhury, Stratis Ioannidis, T. Melodia","doi":"10.1145/3395352.3402625","DOIUrl":"https://doi.org/10.1145/3395352.3402625","url":null,"abstract":"Deep learning techniques can classify spectrum phenomena (e.g., waveform modulation) with accuracy levels that were once thought impossible. Although we have recently seen many advances in this field, extensive work in computer vision has demonstrated that an adversary can \"crack\" a classifier by designing inputs that \"steer\" the classifier away from the ground truth. This paper advances the state of the art by proposing a generalized analysis and evaluation of adversarial machine learning (AML) attacks to deep learning systems in the wireless domain. We postulate a series of adversarial attacks, and formulate a Generalized Wireless Adversarial Machine Learning Problem (GWAP) where we analyze the combined effect of the wireless channel and the adversarial waveform on the efficacy of the attacks. We extensively evaluate the performance of our attacks on a state-of-the-art 1,000-device radio fingerprinting dataset, and a 24-class modulation dataset. Results show that our algorithms can decrease the classifiers' accuracy up to 3x while keeping the waveform distortion to a minimum.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"29 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116800520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Encrypted rich-data steganography using generative adversarial networks 使用生成对抗网络的加密富数据隐写
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402626
Dule Shu, Weilin Cong, Jiaming Chai, Conrad S. Tucker
Steganography has received a great deal of attention within the information security domain due to its potential utility in ensuring network security and privacy. Leveraging advancements in deep neural networks, the state-of-the-art steganography models are capable of encoding a message within a cover image and producing a visually indistinguishable encoded image from which the decoder can recover the original message. While a message of different data types can be converted to a binary message before encoding into a cover image, this work explores the ability of neural network models to encode data types of different modalities. We propose the ERS-GAN (Encrypted Rich-data Steganography Generative Adversarial Network) - an end-to-end generative adversarial network model for efficient data encoding and decoding. Our proposed model is capable of encoding message of multiple types, e.g., text, audio and image, and is able to hide message deeply into a cover image without being detected and decoded by a third-party adversary who is not given permission to access the message. Experiments conducted on the datasets MS-COCO and Speech Commands show that our model out-performs or equally matches the state-of-the-arts in several aspects of steganography performance. Our proposed ERS-GAN can be potentially used to protect the wireless communication against malicious activity such as eavesdropping.
隐写术由于其在保障网络安全和隐私方面的潜在效用,在信息安全领域受到了极大的关注。利用深度神经网络的进步,最先进的隐写模型能够在封面图像中编码信息,并产生视觉上难以区分的编码图像,解码器可以从中恢复原始信息。虽然不同数据类型的消息可以在编码成封面图像之前转换为二进制消息,但这项工作探索了神经网络模型编码不同模态数据类型的能力。我们提出了ERS-GAN(加密富数据隐写生成对抗网络)-一个端到端的生成对抗网络模型,用于有效的数据编码和解码。我们提出的模型能够对多种类型的消息进行编码,例如文本、音频和图像,并且能够将消息深度隐藏到封面图像中,而不会被未被允许访问消息的第三方对手检测和解码。在MS-COCO和Speech Commands数据集上进行的实验表明,我们的模型在隐写性能的几个方面优于或等同于最先进的技术。我们提出的ERS-GAN可以潜在地用于保护无线通信免受恶意活动(如窃听)的侵害。
{"title":"Encrypted rich-data steganography using generative adversarial networks","authors":"Dule Shu, Weilin Cong, Jiaming Chai, Conrad S. Tucker","doi":"10.1145/3395352.3402626","DOIUrl":"https://doi.org/10.1145/3395352.3402626","url":null,"abstract":"Steganography has received a great deal of attention within the information security domain due to its potential utility in ensuring network security and privacy. Leveraging advancements in deep neural networks, the state-of-the-art steganography models are capable of encoding a message within a cover image and producing a visually indistinguishable encoded image from which the decoder can recover the original message. While a message of different data types can be converted to a binary message before encoding into a cover image, this work explores the ability of neural network models to encode data types of different modalities. We propose the ERS-GAN (Encrypted Rich-data Steganography Generative Adversarial Network) - an end-to-end generative adversarial network model for efficient data encoding and decoding. Our proposed model is capable of encoding message of multiple types, e.g., text, audio and image, and is able to hide message deeply into a cover image without being detected and decoded by a third-party adversary who is not given permission to access the message. Experiments conducted on the datasets MS-COCO and Speech Commands show that our model out-performs or equally matches the state-of-the-arts in several aspects of steganography performance. Our proposed ERS-GAN can be potentially used to protect the wireless communication against malicious activity such as eavesdropping.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generative adversarial attacks against intrusion detection systems using active learning 使用主动学习的入侵检测系统生成对抗攻击
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402618
Dule Shu, Nandi O. Leslie, C. Kamhoua, Conrad S. Tucker
Intrusion Detection Systems (IDS) are increasingly adopting machine learning (ML)-based approaches to detect threats in computer networks due to their ability to learn underlying threat patterns/features. However, ML-based models are susceptible to adversarial attacks, attacks wherein slight perturbations of the input features, cause misclassifications. We propose a method that uses active learning and generative adversarial networks to evaluate the threat of adversarial attacks on ML-based IDS. Existing adversarial attack methods require a large amount of training data or assume knowledge of the IDS model itself (e.g., loss function), which may not be possible in real-world settings. Our method overcomes these limitations by demonstrating the ability to compromise an IDS using limited training data and assuming no prior knowledge of the IDS model other than its binary classification (i.e., benign or malicious). Experimental results demonstrate the ability of our proposed model to achieve a 98.86% success rate in bypassing the IDS model using only 25 labeled data points during model training. The knowledge gained by compromising the ML-based IDS, can be integrated into the IDS in order to enhance its robustness against similar ML-based adversarial attacks.
入侵检测系统(IDS)越来越多地采用基于机器学习(ML)的方法来检测计算机网络中的威胁,因为它们能够学习潜在的威胁模式/特征。然而,基于ml的模型容易受到对抗性攻击,其中输入特征的轻微扰动会导致错误分类。我们提出了一种使用主动学习和生成对抗网络来评估基于ml的IDS对抗性攻击威胁的方法。现有的对抗性攻击方法需要大量的训练数据或假设IDS模型本身的知识(例如,损失函数),这在现实环境中可能是不可能的。我们的方法克服了这些限制,它展示了使用有限的训练数据破坏IDS的能力,并且假设除了IDS的二元分类(即良性或恶意)之外,不需要对IDS模型有任何先验知识。实验结果表明,我们提出的模型在模型训练过程中仅使用25个标记数据点就可以绕过IDS模型,成功率达到98.86%。通过破坏基于ml的IDS获得的知识可以集成到IDS中,以增强其对类似的基于ml的对抗性攻击的鲁棒性。
{"title":"Generative adversarial attacks against intrusion detection systems using active learning","authors":"Dule Shu, Nandi O. Leslie, C. Kamhoua, Conrad S. Tucker","doi":"10.1145/3395352.3402618","DOIUrl":"https://doi.org/10.1145/3395352.3402618","url":null,"abstract":"Intrusion Detection Systems (IDS) are increasingly adopting machine learning (ML)-based approaches to detect threats in computer networks due to their ability to learn underlying threat patterns/features. However, ML-based models are susceptible to adversarial attacks, attacks wherein slight perturbations of the input features, cause misclassifications. We propose a method that uses active learning and generative adversarial networks to evaluate the threat of adversarial attacks on ML-based IDS. Existing adversarial attack methods require a large amount of training data or assume knowledge of the IDS model itself (e.g., loss function), which may not be possible in real-world settings. Our method overcomes these limitations by demonstrating the ability to compromise an IDS using limited training data and assuming no prior knowledge of the IDS model other than its binary classification (i.e., benign or malicious). Experimental results demonstrate the ability of our proposed model to achieve a 98.86% success rate in bypassing the IDS model using only 25 labeled data points during model training. The knowledge gained by compromising the ML-based IDS, can be integrated into the IDS in order to enhance its robustness against similar ML-based adversarial attacks.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset 暴露于NSL-KDD数据集的基于contiki - ng的物联网网络的机器学习驱动入侵检测
Pub Date : 2020-07-13 DOI: 10.1145/3395352.3402621
Jinxin Liu, B. Kantarci, C. Adams
Wide adoption of Internet of Things (IoT) devices and applications encounters security vulnerabilities as roadblocks. The heterogeneous nature of IoT systems prevents common benchmarks, such as the NSL-KDD dataset, from being used to test and verify the performance of different Network Intrusion Detection Systems (NIDS). In order to bridge this gap, in this paper, we examine specific attacks in the NSL-KDD dataset that can impact sensor nodes and networks in IoT settings. Furthermore, in order to detect the introduced attacks, we study eleven machine learning algorithms and report the results. Through numerical analysis, we show that tree-based methods and ensemble methods outperform the rest of the studied machine learning methods. Among the supervised algorithms, XGBoost ranks the first with 97% accuracy, 90.5% Matthews correlation coefficient (MCC), and 99.6% Area Under the Curve (AUC) performance. Moreover, a notable research finding of this study is that the Expectation-Maximization (EM) algorithm, which is an unsupervised method, also performs reasonably well in the detection of the attacks in the NSL-KDD dataset and outperforms the accuracy of the Naïve Bayes classifier by 22.0%.
物联网(IoT)设备和应用的广泛采用遇到了安全漏洞作为障碍。物联网系统的异构特性阻止了通用基准(如NSL-KDD数据集)用于测试和验证不同网络入侵检测系统(NIDS)的性能。为了弥补这一差距,在本文中,我们研究了NSL-KDD数据集中可能影响物联网设置中的传感器节点和网络的特定攻击。此外,为了检测引入的攻击,我们研究了11种机器学习算法并报告了结果。通过数值分析,我们表明基于树的方法和集成方法优于其他研究的机器学习方法。在监督算法中,XGBoost以97%的准确率、90.5%的马修斯相关系数(MCC)和99.6%的曲线下面积(AUC)性能排名第一。此外,本研究的一个值得注意的研究发现是,期望最大化(EM)算法作为一种无监督方法,在NSL-KDD数据集的攻击检测中也表现得相当好,并且比Naïve贝叶斯分类器的准确率高出22.0%。
{"title":"Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset","authors":"Jinxin Liu, B. Kantarci, C. Adams","doi":"10.1145/3395352.3402621","DOIUrl":"https://doi.org/10.1145/3395352.3402621","url":null,"abstract":"Wide adoption of Internet of Things (IoT) devices and applications encounters security vulnerabilities as roadblocks. The heterogeneous nature of IoT systems prevents common benchmarks, such as the NSL-KDD dataset, from being used to test and verify the performance of different Network Intrusion Detection Systems (NIDS). In order to bridge this gap, in this paper, we examine specific attacks in the NSL-KDD dataset that can impact sensor nodes and networks in IoT settings. Furthermore, in order to detect the introduced attacks, we study eleven machine learning algorithms and report the results. Through numerical analysis, we show that tree-based methods and ensemble methods outperform the rest of the studied machine learning methods. Among the supervised algorithms, XGBoost ranks the first with 97% accuracy, 90.5% Matthews correlation coefficient (MCC), and 99.6% Area Under the Curve (AUC) performance. Moreover, a notable research finding of this study is that the Expectation-Maximization (EM) algorithm, which is an unsupervised method, also performs reasonably well in the detection of the attacks in the NSL-KDD dataset and outperforms the accuracy of the Naïve Bayes classifier by 22.0%.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126903002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
期刊
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1