4.5 Article

DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks

Journal

COMPUTERS & SECURITY
Volume 109, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2021.102367

Keywords

GAN; Adversarial attacks; Intrusion detection; IDS; Network anomaly detection; SDN

Funding

  1. Vietnam National University HoChiMinh City (VNU-HCM) [DSC2021-26-05]
  2. Vingroup Joint Stock Company
  3. Domestic Master/PhD Scholarship Programme of Vingroup Innovation Foundation (VINIF), Vingroup Big Data Institute (VINBIGDATA) [VINIF.2020.TS.138]

Ask authors/readers for more resources

Machine learning techniques are increasingly used in malicious network traffic detection to enhance the ability of intrusion detection systems (IDS). This study proposes the DIGFuPAS framework for generating adversarial attack samples to deceive IDS in SDN-enabled networks. Experimental results demonstrate that this framework can lead to misclassification of IDS on GAN-based synthetic attacks, reducing the detection rate of black-box IDSs.
Showing a great potential in various domains, machine learning techniques are more and more used in the task of malicious network traffic detection to significantly enhance the ability of intrusion detection system (IDS). When associating with Software-Defined Networks (SDN), the deployment of IDSs can leverage the centralized control plane in SDN to support for large-scale network monitoring. However, machine learning-based IDSs themselves can be attacked and tricked by adversarial examples with additional perturbation from the original ones. It is vital to provide supplementary unknown traffic to evaluate and improve the resilience of IDS against variants of cyberattacks. Thus, this work explores the method of generating adversarial attack samples by Generative Adversarial Model (GAN) to deceive IDS. We propose DIGFuPAS, a framework can create attack samples which can bypass machine learning-based IDSs in SDN with the black-box manner. In this framework, instead of Vanilla GAN, we use Wassertein GAN (WGAN) to improve the ability of GAN convergence training. In addition, the strategy of preserving functional features of attack traffic is applied to maintain the operational aspect of adversarial attacks. Through our implementation and experiments on NSL-KDD and CICIDS2018 dataset, the decreased detection rate of black-box IDSs on adversarial attacks demonstrates that our proposed framework can make IDSs in SDN-enabled networks misclassify on GAN-based synthetic attacks. Also, we utilize DIGFuPAS as a tool for evaluating and improving the robustness of IDS by repetitively retraining classifiers from crafted network traffic flow. (c) 2021 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain

Phan The Duy, Hien Do Hoang, Do Thi Thu Hien, Anh Gia-Tuan Nguyen, Van-Hau Pham

Summary: Software-Defined Network (SDN) is a network architecture that separates the control plane and data plane, providing orchestration features. While it brings benefits, SDN is vulnerable to attacks. To address this, we introduce B-DAC, a blockchain-based framework for decentralized authentication and fine-grained access control to protect network resources.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Article Computer Science, Information Systems

Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks

Phan The Duy, Nghi Hoang Khoa, Do Thi Thu Hien, Hien Do Hoang, Van-Hau Pham

Summary: Software Defined Networking (SDN) is used as the key technology to program and coordinate security policies in security operations centers (SOCs) for diverse networks. However, machine learning-based intrusion detection systems (ML-IDS) associated with SDN are susceptible to adversarial attacks due to the lack of diverse malicious records in the training dataset. This study explores the use of Wasserstein Generative Adversarial Networks (WGAN-GP), WGAN-GP with the two timescale update rule (WGAN-GP TTUR), and AdvGAN to generate perturbed attack samples for bypassing attack detectors and improving the resilience of ML-based IDSs in SDN.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2023)

Article Computer Science, Information Systems

FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT

Phan The Duy, Nguyen Huu Quyen, Nghi Hoang Khoa, Tuan-Dung Tran, Van-Hau Pham

Summary: In the development of the Industrial Internet of Things (IIoT), cyber threats and attacks have become major concerns. Lack of threat intelligence sharing due to privacy and transparency issues hinders the uncovering of malicious actors. This paper proposes a blockchain and federated learning-based framework, FedChain-Hunter, to address these challenges and ensure security, reliability, and privacy.

INTERNET OF THINGS (2023)

Proceedings Paper Computer Science, Information Systems

Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning

Nguyen Huu Quyen, Phan The Duy, Nguyen Chi Vy, Do Thi Thu Hien, Van-Hau Pham

Summary: This paper introduces a federated IDS approach using Generative Adversarial Networks (GANs) and Reinforcement Learning (RL) to handle non-independent and identically distributed data in organizational networks. The imbalanced data classes are addressed through GAN-based data augmentation, while RL improves the client choosing process for federated IDS model training. Experimental results on the Kitsune dataset demonstrate that this approach facilitates collaboration between data holders to build more effective IDS systems with distinguished data distribution.

INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022 (2022)

Proceedings Paper Computer Science, Information Systems

Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network

Cao Phan Xuan Qui, Dang Hong Quang, Phan The Duy, Do Thi Thu Hien, Van-Hau Pham

Summary: A framework that generates data flow of cyberattacks capable of bypassing machine learning-based intrusion detection systems (ML-IDS) was proposed to improve the IDS's capability in detecting sophisticated attacks. By generating data flows to retrain ML-IDS, the framework enhances the robustness of IDS against attacks. Experimental results show that this method effectively improves the performance of IDS in detecting malicious attacks.

2021 RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES (RIVF 2021) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

A Blockchain-based Secured and Privacy-Preserved Personal Healthcare Record Exchange System

Hien Do Hoang, Do Thi Thu Hien, Thach Canh Nhut, Phan Dang True Quyen, Phan The Duy, Van-Hau Pham

Summary: As the demand for personal healthcare record exchange between EMR systems and patients grows, efforts to improve quality, safety, privacy and efficiency in healthcare information delivery are notable. Issues such as fragmented communication and lack of interoperability in EMR systems pose challenges for healthcare professionals, hospitals, clinics, and patients. Blockchain technology can ensure trust, security, and privacy of individual data in the digital world.

2021 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES (ICMLANT II) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

PWDGAN: Generating Adversarial Malicious URL Examples for Deceiving Black-Box Phishing Website Detector using GANs

Trinh Nguyen Bac, Phan The Duy, Van-Hau Pham

Summary: In recent years, there has been a significant increase in phishing attacks on the Internet, with attackers using increasingly sophisticated techniques to bypass traditional defense solutions. Research has developed solutions and software products to enhance the ability to detect phishing attacks using machine learning and deep learning algorithms. A model based on generative adversarial network (GAN) was built to evade and bypass ML-based phishing detectors, demonstrating the effectiveness of GAN in creating new patterns that can deceive these detectors.

2021 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES (ICMLANT II) (2021)

Proceedings Paper Computer Science, Interdisciplinary Applications

Forensic analysis of TikTok application to seek digital artifacts on Android smartphone

Nghi Hoang Khoa, Phan The Duy, Hien Do Hoang, Do Thi Thu Hien, Van-Hau Pham

2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020) (2020)

Proceedings Paper Computer Science, Theory & Methods

SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics using Blockchain

Phan The Duy, Hien Do Hoang, Do Thi Thu Hien, Nguyen Ba Khanh, Van-Hau Pham

PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS) (2019)

Proceedings Paper Computer Science, Theory & Methods

A Security-Enhanced Monitoring System for Northbound Interface in SDN using Blockchain

Hien Do Hoang, Phan The Duy, Van-Hau Pham

SOICT 2019: PROCEEDINGS OF THE TENTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (2019)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)