Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems

Muhammad Usama, Muhammad Asim, Siddique Latif, Junaid Qadir, Ala-Al-Fuqaha

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    147 Citations (Scopus)

    Abstract

    Intrusion detection systems (IDSs) are an essential cog of the network security suite that can defend the network from malicious intrusions and anomalous traffic. Many machine learning (ML)-based IDSs have been proposed in the literature for the detection of malicious network traffic. However, recent works have shown that ML models are vulnerable to adversarial perturbations through which an adversary can cause IDSs to malfunction by introducing a small impracticable perturbation in the network traffic. In this paper, we propose an adversarial ML attack using generative adversarial networks (GANs) that can successfully evade an ML-based IDS. We also show that GANs can be used to inoculate the IDS and make it more robust to adversarial perturbations.

    Original languageEnglish
    Title of host publication2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages78-83
    Number of pages6
    ISBN (Electronic)9781538677476
    DOIs
    Publication statusPublished - Jun 2019
    Event15th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2019 - Tangier, Morocco
    Duration: 24 Jun 201928 Jun 2019

    Publication series

    Name2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019

    Conference

    Conference15th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2019
    Country/TerritoryMorocco
    CityTangier
    Period24/06/1928/06/19

    Keywords

    • Adversarial machine learning
    • GAN
    • IDS

    Fingerprint

    Dive into the research topics of 'Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems'. Together they form a unique fingerprint.

    Cite this