TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems

Islam Debicha, Richard Bauwens, Thibault Debatty, Jean Michel Dricot, Tayeb Kenaza, Wim Mees

Research output: Contribution to journalArticlepeer-review

Abstract

Nowadays, intrusion detection systems based on deep learning deliver state-of-the-art performance. However, recent research has shown that specially crafted perturbations, called adversarial examples, are capable of significantly reducing the performance of these intrusion detection systems. The objective of this paper is to design an efficient transfer learning-based adversarial detector and then to assess the effectiveness of using multiple strategically placed adversarial detectors compared to a single adversarial detector for intrusion detection systems. In our experiments, we implement existing state-of-the-art models for intrusion detection. We then attack those models with a set of chosen evasion attacks. In an attempt to detect those adversarial attacks, we design and implement multiple transfer learning-based adversarial detectors, each receiving a subset of the information passed through the IDS. By combining their respective decisions, we illustrate that combining multiple detectors can further improve the detectability of adversarial traffic compared to a single detector in the case of a parallel IDS design.

Original languageEnglish
Pages (from-to)185-197
Number of pages13
JournalFuture Generation Computer Systems
Volume138
DOIs
Publication statusPublished - Jan 2023

Keywords

  • Adversarial detection
  • Data fusion
  • Evasion attacks
  • Intrusion detection system
  • Machine learning
  • Transfer learning

Fingerprint

Dive into the research topics of 'TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems'. Together they form a unique fingerprint.

Cite this