Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems

  • Muhammad Usama
  • , Muhammad Asim
  • , Siddique Latif
  • , Junaid Qadir
  • , Ala-Al-Fuqaha

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

186 Citations (Scopus)

Abstract

Intrusion detection systems (IDSs) are an essential cog of the network security suite that can defend the network from malicious intrusions and anomalous traffic. Many machine learning (ML)-based IDSs have been proposed in the literature for the detection of malicious network traffic. However, recent works have shown that ML models are vulnerable to adversarial perturbations through which an adversary can cause IDSs to malfunction by introducing a small impracticable perturbation in the network traffic. In this paper, we propose an adversarial ML attack using generative adversarial networks (GANs) that can successfully evade an ML-based IDS. We also show that GANs can be used to inoculate the IDS and make it more robust to adversarial perturbations.

Original languageEnglish
Title of host publication2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages78-83
Number of pages6
ISBN (Electronic)9781538677476
DOIs
Publication statusPublished - Jun 2019
Event15th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2019 - Tangier, Morocco
Duration: 24 Jun 201928 Jun 2019

Publication series

Name2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019

Conference

Conference15th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2019
Country/TerritoryMorocco
CityTangier
Period24/06/1928/06/19

Keywords

  • Adversarial machine learning
  • GAN
  • IDS

Fingerprint

Dive into the research topics of 'Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems'. Together they form a unique fingerprint.

Cite this