Abstract
This paper presents adversarial attacks on machine learning (ML) algorithms in intrusion detection systems (IDSs). Some examples of existing IDSs are examined. The existing approaches for detecting these attacks are considered. Requirements are developed to increase the stability of ML algorithms. Two approaches to detect adversarial attacks on ML algorithms are proposed, the first of which is based on a multiclass classifier and a Honeypot system, and the second approach uses a combination of a multiclass and binary classifier. The proposed approaches can be used in further research aimed at detecting adversarial attacks on ML algorithms.



REFERENCES
Alotaibi, A. and Rassam, M.A., Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense, Future Internet, 2023, vol. 15, no. 2, p. 62. https://doi.org/10.3390/fi15020062
Wang, N., Chen, Yi., Hu, Ya., Lou, W., and Hou, Y.T., MANDA: On adversarial example detection for network intrusion detection system, IEEE INFOCOM 2021—IEEE Conference on Computer Communications, Vancouver, 2021, IEEE, 2021, pp. 1–10. https://doi.org/10.1109/infocom42981.2021.9488874
Danilov, V.D., Ovasapyan, T.D., Ivanov, D.V., Konoplev, A.S., and Moskvin, D.A., Generation of synthetic data for honeypot systems using deep learning methods, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 916–926. https://doi.org/10.3103/S014641162208003X
Dini, P., Elhanashi, A., Begni, A., Saponara, S., Zheng, Q., and Gasmi, K., Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity, Appl. Sci., 2023, vol. 13, no. 13, p. 7507. https://doi.org/10.3390/app13137507
Kalinin, M.O., Suprun, A.F., and Ivanova, O.D., Hybrid method for the detection of evasion attacks aimed at machine learning systems, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 983–988. https://doi.org/10.3103/s0146411623080072
Kulikov, D.A. and Platonov, V.V., Adversarial attacks on intrusion detection systems using the LSTM classifier, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1080–1086. https://doi.org/10.3103/s0146411621080174
Qureshi, A.U.H., Larijani, H., Yousefi, M., Adeel, A., and Mtetwa, N., An adversarial approach for intrusion detection systems using Jacobian saliency map attacks (JSMA) algorithm, Computers, 2020, vol. 9, no. 3, p. 58. https://doi.org/10.3390/computers9030058
Liu, G., Zhang, W., Li, X., Fan, K., and Yu, Sh., VulnerGAN: A backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems, Sci. China: Inf. Sci., 2022, vol. 65, no. 7, p. 170303. https://doi.org/10.1007/s11432-021-3455-1
Aleksandrova, E., Pendrikova, O., Shtyrkina, A., Shkorkina, E., Yarmak, A., and Tick, J., Threshold isogeny-based group authentication scheme, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvári, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 117–126. https://doi.org/10.1007/978-3-030-93872-7_10
Moosavi-Dezfooli, S.-M., Fawzi, A., and Frossard, P., DeepFool: A simple and accurate method to fool deep neural networks, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 2016, IEEE, 2016, pp. 2574–2582. https://doi.org/10.1109/cvpr.2016.282
Ovasapyan, T.D., Danilov, V.D., and Moskvin, D.A., Application of synthetic data generation methods to the detection of network attacks on internet of things devices, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 991–998. https://doi.org/10.3103/s0146411621080241
Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Automated search for vulnerabilities in ARM software using dynamic symbolic execution, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 932–940. https://doi.org/10.3103/s014641162108023x
Orekondy, T., Schiele, B., and Fritz, M., Knockoff nets: Stealing functionality of black-box models, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, 2018, IEEE, 2018, pp. 4949–4958. https://doi.org/10.1109/cvpr.2019.00509
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, Ch., Mylonas, A., and Buchanan, W.J., Launching adversarial attacks against network intrusion detection systems for IoT, Journal of Cybersecurity and Privacy, 2021, vol. 1, no. 2, pp. 252–273. https://doi.org/10.3390/jcp1020014
Pujari, M., Cherukuri, B.P., Javaid, A.Y., and Sun, W., An approach to improve the robustness of machine learning based intrusion detection system models against the Carlini–Wagner attack, 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 2022, IEEE, 2022. https://doi.org/10.1109/csr54599.2022.9850306
Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https://doi.org/10.3390/en15114123
Correia-Silva, J.R., Berriel, R.F., Badue, C., De Souza, A.F., and Oliveira-Santos, T., Copycat CNN: Are random non-Labeled data enough to steal knowledge from black-box models?, Pattern Recognit., 2021, vol. 113, p. 107830. https://doi.org/10.1016/j.patcog.2021.107830
Kalinin, M.O., Soshnev, M.D., and Konoplev, A.S., Protection of computational machine learning models against extraction threat, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 996–1004. https://doi.org/10.3103/s0146411623080084
Fredrikson, M., Jha, S., and Ristenpart, T., Model inversion attacks that exploit confidence information and basic countermeasures, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, New York: Association for Computing Machinery, 2015, pp. 1322–1333. https://doi.org/10.1145/2810103.2813677
Aleksandrova, E.B., Lavrova, D.S., and Yarmak, A.V., Benford’s law in the detection of DoS attacks on industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 954–962. https://doi.org/10.3103/s0146411619080030
Hashemi, M.J. and Keller, E., Enhancing robustness against adversarial examples in network intrusion detection systems, 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Leganes, Spain, 2020, IEEE, 2020, pp. 37–43. https://doi.org/10.1109/nfv-sdn50289.2020.9289869
Qian, Y.-G., Lu, H.-B., Ji, S.-L., Zhou, W.-J., Wu, S.-H., Lei, J.-S., and Tao, X.-X., A poisoning attack on intrusion detection system based on SVM, Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, vol. 47, pp. 59–65. https://doi.org/10.3969/j.issn.0372-2112.2019.01.008
Krundyshev, V.M., Ensuring cybersecurity of digital production using modern neural network methods, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 786–792. https://doi.org/10.3103/s0146411620080179
Poltavtseva, M.A. and Zegzhda, D.P., Building an adaptive system for collecting and preparing data for security monitoring, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 968–976. https://doi.org/10.3103/s0146411620080283
Catak, F.O. and Yayilgan, S.Y., Deep neural network based malicious network activity detection under adversarial machine learning attacks, Intelligent Technologies and Applications. INTAP 2020, Yildirim Yayilgan, S., Bajwa, I.S., and Sanfilippo, F., Eds., Communications in Computer and Information Science, vol. 1382, Cham: Springer, 2020, pp. 280–291. https://doi.org/10.1007/978-3-030-71711-7_23
Zhang, Ch., Costa-Perez, X., and Patras, P., Tiki-Taka: Attacking and defending deep learning-based intrusion detection systems, Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, New York: Association for Computing Machinery, 2020, pp. 27–39. https://doi.org/10.1145/3411495.3421359
Zhu, C., Huang, W.R., Shafahi, A., Li, H., Taylor, G., Studer, C., Goldstein, T., and Huang, R., Transferable clean-label poisoning attacks on deep neural nets, Proceedings of Machine Learning Research, 2019, vol. 97, pp. 7614–7623. https://proceedings.mlr.press/v97/zhu19a.html.
Myasnikov, A.V., Konoplev, A.S., Suprun, A.F., Anisimov, V.G., Kasatkin, V.V., and Los’, V.P., Constructing the model of an information system for the automatization of penetration testing, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 949–955. https://doi.org/10.3103/s0146411621080216
Kalinin, M., Krundyshev, V., and Zegzhda, D., AI methods for neutralizing cyber threats at unmanned vehicular ecosystem of smart city, The Economics of Digital Transformation, Devezas, T., Leitão, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 157–171. https://doi.org/10.1007/978-3-030-59959-1_10
Li, Sh., Wang, J., Wang, Yu., Zhou, G., and Zhao, Ya., EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT, Heliyon, 2023, vol. 9, no. 2, p. e13520. https://doi.org/10.1016/j.heliyon.2023.e13520
Kalinin, M.O., Soshnev, M.D., and Konoplev, A.S., Protection of computational machine learning models against extraction threat, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 996–1004. https://doi.org/10.3103/s0146411623080084
Kalinin, M.O., Suprun, A.F., and Ivanova, O.D., Hybrid method for the detection of evasion attacks aimed at machine learning systems, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 983–988. https://doi.org/10.3103/s0146411623080072
Kalinin, M. and Krundyshev, V., Security intrusion detection using quantum machine learning techniques, J. Comput. Virol. Hacking Tech., 2022, vol. 19, no. 1, pp. 125–136. https://doi.org/10.1007/s11416-022-00435-0
Funding
This work was supported by ongoing institutional funding. No additional grants to carry out or direct this particular research were obtained.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors of this work declare that they have no conflicts of interest.
Additional information
Publisher’s Note.
Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
AI tools may have been used in the translation or editing of this article.
About this article
Cite this article
Yugai, P.E., Moskvin, D.A. Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems. Aut. Control Comp. Sci. 58, 1226–1233 (2024). https://doi.org/10.3103/S014641162470086X
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S014641162470086X