3
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The incremental diffusion of machine learning algorithms in supporting cybersecurity is creating novel defensive opportunities but also new types of risks. Multiple researches have shown that machine learning methods are vulnerable to adversarial attacks that create tiny perturbations aimed at decreasing the effectiveness of detecting threats. We observe that existing literature assumes threat models that are inappropriate for realistic cybersecurity scenarios, because they consider opponents with complete knowledge about the cyber detector or that can freely interact with the target systems. By focusing on Network Intrusion Detection Systems based on machine learning, we identify and model the real capabilities and circumstances required by attackers to carry out feasible and successful adversarial attacks. We then apply our model to several adversarial attacks proposed in literature and highlight the limits and merits that can result in actual adversarial attacks. The contributions of this article can help hardening defensive systems by letting cyber defenders address the most critical and real issues and can benefit researchers by allowing them to devise novel forms of adversarial attacks based on realistic threat models.

          Related collections

          Most cited references102

          • Record: found
          • Abstract: not found
          • Article: not found

          A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            An Intrusion-Detection Model

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset

                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                Journal
                Digital Threats: Research and Practice
                Digital Threats
                Association for Computing Machinery (ACM)
                2692-1626
                2576-5337
                September 30 2022
                February 07 2022
                September 30 2022
                : 3
                : 3
                : 1-19
                Affiliations
                [1 ]Institute of Information Systems, University of Liechtenstein, Vaduz, Liechtenstein
                [2 ]Department of Physics, Informatics and Mathematics, University of Modena and Reggio Emilia, Modena, Italy
                [3 ]Department of Engineering “Enzo Ferrari,” University of Modena and Reggio Emilia, Modena, Italy
                [4 ]Department of Informatics, Science and Engineering, University of Bologna, Bologna, Italy
                Article
                10.1145/3469659
                a30d132e-3a67-442a-a851-65f930ad8c44
                © 2022
                History

                Comments

                Comment on this article