Skip to main content
Log in

Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This paper presents adversarial attacks on machine learning (ML) algorithms in intrusion detection systems (IDSs). Some examples of existing IDSs are examined. The existing approaches for detecting these attacks are considered. Requirements are developed to increase the stability of ML algorithms. Two approaches to detect adversarial attacks on ML algorithms are proposed, the first of which is based on a multiclass classifier and a Honeypot system, and the second approach uses a combination of a multiclass and binary classifier. The proposed approaches can be used in further research aimed at detecting adversarial attacks on ML algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.

REFERENCES

  1. Alotaibi, A. and Rassam, M.A., Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense, Future Internet, 2023, vol. 15, no. 2, p. 62. https://doi.org/10.3390/fi15020062

    Article  Google Scholar 

  2. Wang, N., Chen, Yi., Hu, Ya., Lou, W., and Hou, Y.T., MANDA: On adversarial example detection for network intrusion detection system, IEEE INFOCOM 2021—IEEE Conference on Computer Communications, Vancouver, 2021, IEEE, 2021, pp. 1–10. https://doi.org/10.1109/infocom42981.2021.9488874

  3. Danilov, V.D., Ovasapyan, T.D., Ivanov, D.V., Konoplev, A.S., and Moskvin, D.A., Generation of synthetic data for honeypot systems using deep learning methods, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 916–926. https://doi.org/10.3103/S014641162208003X

    Article  Google Scholar 

  4. Dini, P., Elhanashi, A., Begni, A., Saponara, S., Zheng, Q., and Gasmi, K., Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity, Appl. Sci., 2023, vol. 13, no. 13, p. 7507. https://doi.org/10.3390/app13137507

    Article  Google Scholar 

  5. Kalinin, M.O., Suprun, A.F., and Ivanova, O.D., Hybrid method for the detection of evasion attacks aimed at machine learning systems, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 983–988. https://doi.org/10.3103/s0146411623080072

    Article  Google Scholar 

  6. Kulikov, D.A. and Platonov, V.V., Adversarial attacks on intrusion detection systems using the LSTM classifier, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1080–1086. https://doi.org/10.3103/s0146411621080174

    Article  Google Scholar 

  7. Qureshi, A.U.H., Larijani, H., Yousefi, M., Adeel, A., and Mtetwa, N., An adversarial approach for intrusion detection systems using Jacobian saliency map attacks (JSMA) algorithm, Computers, 2020, vol. 9, no. 3, p. 58. https://doi.org/10.3390/computers9030058

    Article  Google Scholar 

  8. Liu, G., Zhang, W., Li, X., Fan, K., and Yu, Sh., VulnerGAN: A backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems, Sci. China: Inf. Sci., 2022, vol. 65, no. 7, p. 170303. https://doi.org/10.1007/s11432-021-3455-1

    Article  MathSciNet  Google Scholar 

  9. Aleksandrova, E., Pendrikova, O., Shtyrkina, A., Shkorkina, E., Yarmak, A., and Tick, J., Threshold isogeny-based group authentication scheme, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvári, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 117–126. https://doi.org/10.1007/978-3-030-93872-7_10

  10. Moosavi-Dezfooli, S.-M., Fawzi, A., and Frossard, P., DeepFool: A simple and accurate method to fool deep neural networks, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 2016, IEEE, 2016, pp. 2574–2582. https://doi.org/10.1109/cvpr.2016.282

  11. Ovasapyan, T.D., Danilov, V.D., and Moskvin, D.A., Application of synthetic data generation methods to the detection of network attacks on internet of things devices, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 991–998. https://doi.org/10.3103/s0146411621080241

    Article  Google Scholar 

  12. Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Automated search for vulnerabilities in ARM software using dynamic symbolic execution, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 932–940. https://doi.org/10.3103/s014641162108023x

    Article  Google Scholar 

  13. Orekondy, T., Schiele, B., and Fritz, M., Knockoff nets: Stealing functionality of black-box models, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, 2018, IEEE, 2018, pp. 4949–4958. https://doi.org/10.1109/cvpr.2019.00509

  14. Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, Ch., Mylonas, A., and Buchanan, W.J., Launching adversarial attacks against network intrusion detection systems for IoT, Journal of Cybersecurity and Privacy, 2021, vol. 1, no. 2, pp. 252–273. https://doi.org/10.3390/jcp1020014

    Article  Google Scholar 

  15. Pujari, M., Cherukuri, B.P., Javaid, A.Y., and Sun, W., An approach to improve the robustness of machine learning based intrusion detection system models against the Carlini–Wagner attack, 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 2022, IEEE, 2022. https://doi.org/10.1109/csr54599.2022.9850306

  16. Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https://doi.org/10.3390/en15114123

    Article  Google Scholar 

  17. Correia-Silva, J.R., Berriel, R.F., Badue, C., De Souza, A.F., and Oliveira-Santos, T., Copycat CNN: Are random non-Labeled data enough to steal knowledge from black-box models?, Pattern Recognit., 2021, vol. 113, p. 107830. https://doi.org/10.1016/j.patcog.2021.107830

    Article  Google Scholar 

  18. Kalinin, M.O., Soshnev, M.D., and Konoplev, A.S., Protection of computational machine learning models against extraction threat, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 996–1004. https://doi.org/10.3103/s0146411623080084

    Article  Google Scholar 

  19. Fredrikson, M., Jha, S., and Ristenpart, T., Model inversion attacks that exploit confidence information and basic countermeasures, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, New York: Association for Computing Machinery, 2015, pp. 1322–1333. https://doi.org/10.1145/2810103.2813677

  20. Aleksandrova, E.B., Lavrova, D.S., and Yarmak, A.V., Benford’s law in the detection of DoS attacks on industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 954–962. https://doi.org/10.3103/s0146411619080030

    Article  Google Scholar 

  21. Hashemi, M.J. and Keller, E., Enhancing robustness against adversarial examples in network intrusion detection systems, 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Leganes, Spain, 2020, IEEE, 2020, pp. 37–43. https://doi.org/10.1109/nfv-sdn50289.2020.9289869

  22. Qian, Y.-G., Lu, H.-B., Ji, S.-L., Zhou, W.-J., Wu, S.-H., Lei, J.-S., and Tao, X.-X., A poisoning attack on intrusion detection system based on SVM, Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, vol. 47, pp. 59–65. https://doi.org/10.3969/j.issn.0372-2112.2019.01.008

    Article  Google Scholar 

  23. Krundyshev, V.M., Ensuring cybersecurity of digital production using modern neural network methods, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 786–792. https://doi.org/10.3103/s0146411620080179

    Article  Google Scholar 

  24. Poltavtseva, M.A. and Zegzhda, D.P., Building an adaptive system for collecting and preparing data for security monitoring, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 968–976. https://doi.org/10.3103/s0146411620080283

    Article  Google Scholar 

  25. Catak, F.O. and Yayilgan, S.Y., Deep neural network based malicious network activity detection under adversarial machine learning attacks, Intelligent Technologies and Applications. INTAP 2020, Yildirim Yayilgan, S., Bajwa, I.S., and Sanfilippo, F., Eds., Communications in Computer and Information Science, vol. 1382, Cham: Springer, 2020, pp. 280–291. https://doi.org/10.1007/978-3-030-71711-7_23

  26. Zhang, Ch., Costa-Perez, X., and Patras, P., Tiki-Taka: Attacking and defending deep learning-based intrusion detection systems, Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, New York: Association for Computing Machinery, 2020, pp. 27–39. https://doi.org/10.1145/3411495.3421359

  27. Zhu, C., Huang, W.R., Shafahi, A., Li, H., Taylor, G., Studer, C., Goldstein, T., and Huang, R., Transferable clean-label poisoning attacks on deep neural nets, Proceedings of Machine Learning Research, 2019, vol. 97, pp. 7614–7623. https://proceedings.mlr.press/v97/zhu19a.html.

  28. Myasnikov, A.V., Konoplev, A.S., Suprun, A.F., Anisimov, V.G., Kasatkin, V.V., and Los’, V.P., Constructing the model of an information system for the automatization of penetration testing, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 949–955. https://doi.org/10.3103/s0146411621080216

    Article  Google Scholar 

  29. Kalinin, M., Krundyshev, V., and Zegzhda, D., AI methods for neutralizing cyber threats at unmanned vehicular ecosystem of smart city, The Economics of Digital Transformation, Devezas, T., Leitão, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 157–171. https://doi.org/10.1007/978-3-030-59959-1_10

  30. Li, Sh., Wang, J., Wang, Yu., Zhou, G., and Zhao, Ya., EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT, Heliyon, 2023, vol. 9, no. 2, p. e13520. https://doi.org/10.1016/j.heliyon.2023.e13520

    Article  Google Scholar 

  31. Kalinin, M.O., Soshnev, M.D., and Konoplev, A.S., Protection of computational machine learning models against extraction threat, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 996–1004. https://doi.org/10.3103/s0146411623080084

    Article  Google Scholar 

  32. Kalinin, M.O., Suprun, A.F., and Ivanova, O.D., Hybrid method for the detection of evasion attacks aimed at machine learning systems, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 983–988. https://doi.org/10.3103/s0146411623080072

    Article  Google Scholar 

  33. Kalinin, M. and Krundyshev, V., Security intrusion detection using quantum machine learning techniques, J. Comput. Virol. Hacking Tech., 2022, vol. 19, no. 1, pp. 125–136. https://doi.org/10.1007/s11416-022-00435-0

    Article  Google Scholar 

Download references

Funding

This work was supported by ongoing institutional funding. No additional grants to carry out or direct this particular research were obtained.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. E. Yugai.

Ethics declarations

The authors of this work declare that they have no conflicts of interest.

Additional information

Publisher’s Note.

Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

AI tools may have been used in the translation or editing of this article.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yugai, P.E., Moskvin, D.A. Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems. Aut. Control Comp. Sci. 58, 1226–1233 (2024). https://doi.org/10.3103/S014641162470086X

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S014641162470086X

Keywords: