Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems

Chaoyun Zhang, Xavier Costa-Perez, Paul Patras

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

Neural networks are increasingly important in the developmentof Network Intrusion Detection Systems (NIDS), as they have the potential to achieve high detection accuracy while requiring limited feature engineering. Deep learning-based detectors can be however vulnerable to adversarial examples, by which attackers that maybe oblivious to the precise mechanics of the targeted NIDS add subtle perturbations to malicious traffic features, with the aim of evading detection and disrupting critical systems in a cost-effective manner. Defending against such adversarial attacks is therefore of high importance, but requires to address daunting challenges.
In this paper, we introduce Tiki-Taka, a general framework for (i) assessing the robustness of state-of-the-art deep learning-based NIDS against adversarial manipulations, and which (ii) incorporates our proposed defense mechanisms to increase the NIDS’ resistance to attacks employing such evasion techniques. Specifically, we select five different cutting-edge adversarial attack mechanisms to subvert three popular malicious traffic detectors that employ neural networks. We experiment with a publicly available dataset and consider both one-to-all and one-to-one classification scenarios, i.e., discriminating illicit vs benign traffic and respectively identifying specific types of anomalous traffic among many observed. The results obtained reveal that, under realistic constraints, attackers can evade NIDS with up to 35.7% success rates, by only altering time-based features of the traffic generated. To counteract these weaknesses, we propose three defense mechanisms, namely: model voting ensembling, ensembling adversarial training, and query detection. To the best of our knowledge, our work is the first to propose defenses against adversarial attacks targeting NIDS. We demonstrate that when employing the proposed methods, intrusion detection rates can be improved to nearly 100% against most types of malicious traffic, and attacks with potentially catastrophic consequences (e.g., botnet) can be thwarted. This confirms the effectiveness of our solutions and makes the case for their adoption when designing robust and reliable deep anomaly detectors
Original languageEnglish
Title of host publicationProceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop
PublisherACM Association for Computing Machinery
Pages27-39
Number of pages13
ISBN (Print)9781450380843
DOIs
Publication statusPublished - 9 Nov 2020
EventThe ACM Cloud Computing Security Workshop 2020 - Orlando (possibly virtual) , United States
Duration: 9 Nov 20209 Nov 2020
https://ccsw.io/

Workshop

WorkshopThe ACM Cloud Computing Security Workshop 2020
Abbreviated titleCCSW 2020
Country/TerritoryUnited States
CityOrlando (possibly virtual)
Period9/11/209/11/20
Internet address

Keywords / Materials (for Non-textual outputs)

  • Adversarial Attacks
  • Network Intrusion Detection Systems
  • Deep Learning

Fingerprint

Dive into the research topics of 'Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems'. Together they form a unique fingerprint.

Cite this