Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 3/2024

11.10.2023 | Research Article-Computer Engineering and Computer Science

A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks

verfasst von: Yasmeen Alslman, Mouhammd Alkasassbeh, Mohammad Almseidin

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 3/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the increase in cyber security attacks, organizations tend to use an intrusion detection system (IDS) based on machine learning. Through the years, IDS based on machine learning has shown their effectiveness in protecting one against attacks. Aside from the machine learning nature being a black-box, there is a possibility of adversaries that can mess up the classification model. Using machine learning in critical aspects such as the medical field and intrusion detection system can result in disastrous impacts on organizations if it is vulnerable to adversary attacks. This paper proposes a new defense approach based on denoising auto-encoder (DAE) to protect IDS from adversarial attacks. To verify the efficacy of the proposed defense mechanism in mitigating adversarial attacks, two datasets were used. The experimental results show that the proposed defense mechanism proves validity against four white-box attacks and one black-box attack. The system’s accuracy under adversarial attack elevates from around 68% to 90% and 97% under normal conditions on the first dataset. Similarly, on the second dataset, the models’ accuracy increases from 64 to 85% under normal conditions and adversarial attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Almseidin, M.; Alkasassbeh, M.; Kovacs, S.: Fuzzy rule interpolation and snmp-mib for emerging network abnormality. arXiv preprint arXiv:1811.08954 (2018). Almseidin, M.; Alkasassbeh, M.; Kovacs, S.: Fuzzy rule interpolation and snmp-mib for emerging network abnormality. arXiv preprint arXiv:​1811.​08954 (2018).
2.
Zurück zum Zitat Dalvi, N.; Domingos, P.; Sanghai, S.; Verma, D.: Adversarial classification. In:Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 99–108 (2004) Dalvi, N.; Domingos, P.; Sanghai, S.; Verma, D.: Adversarial classification. In:Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 99–108 (2004)
3.
Zurück zum Zitat Biggio, B.; Nelson, B.; Laskov, P.: Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389 (2012) Biggio, B.; Nelson, B.; Laskov, P.: Poisoning attacks against support vector machines. arXiv preprint arXiv:​1206.​6389 (2012)
4.
Zurück zum Zitat Machado, G.R.; Silva, E.; Goldschmidt, R.R.: Adversarial machine learning in image classification: A survey toward the defender’s perspective. ACM Comput. Surv. (CSUR) 55(1), 1–38 (2021)CrossRef Machado, G.R.; Silva, E.; Goldschmidt, R.R.: Adversarial machine learning in image classification: A survey toward the defender’s perspective. ACM Comput. Surv. (CSUR) 55(1), 1–38 (2021)CrossRef
5.
Zurück zum Zitat Goodfellow, I.J.; Shlens, J.; Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014). Goodfellow, I.J.; Shlens, J.; Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:​1412.​6572 (2014).
6.
Zurück zum Zitat Abushwereb, M.; Mustafa, M.; Al-Kasassbeh, M.; Qasaimeh, M.: Attack based dos attack detection using multiple classifier. arXiv preprint arXiv:2001.05707 (2020). Abushwereb, M.; Mustafa, M.; Al-Kasassbeh, M.; Qasaimeh, M.: Attack based dos attack detection using multiple classifier. arXiv preprint arXiv:​2001.​05707 (2020).
7.
Zurück zum Zitat Radivilova, T.; Kirichenko, L.; Ageiev, D.; Bulakh, V.: Classification methods of machine learning to detect ddos attacks. In: 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1, pp. 207–210. IEEE, (2019). Radivilova, T.; Kirichenko, L.; Ageiev, D.; Bulakh, V.: Classification methods of machine learning to detect ddos attacks. In: 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1, pp. 207–210. IEEE, (2019).
8.
Zurück zum Zitat Manna, A.; Alkasassbeh, M.: Detecting network anomalies using machine learning and snmp-mib dataset with ip group. In: 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), pp. 1–5. IEEE (2019). Manna, A.; Alkasassbeh, M.: Detecting network anomalies using machine learning and snmp-mib dataset with ip group. In: 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), pp. 1–5. IEEE (2019).
9.
Zurück zum Zitat Al-Naymat, G.; Hambouz, A.; Al-Kasassbeh, M.: Evaluating the impact of feature selection methods on snmp-mib interface parameters to accurately detect network anomalies. In: 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 1–6. IEEE (2019). Al-Naymat, G.; Hambouz, A.; Al-Kasassbeh, M.: Evaluating the impact of feature selection methods on snmp-mib interface parameters to accurately detect network anomalies. In: 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 1–6. IEEE (2019).
10.
Zurück zum Zitat Trifonov, R.; Gotseva, D.; Stoynov, P.: Brute force network attack detection through neural networks. In: 2021 XXX International Scientific Conference Electronics (ET), pp. 1–4. IEEE (2021). Trifonov, R.; Gotseva, D.; Stoynov, P.: Brute force network attack detection through neural networks. In: 2021 XXX International Scientific Conference Electronics (ET), pp. 1–4. IEEE (2021).
11.
Zurück zum Zitat Al-Naymat, G.; Al-Kasassbeh, M.; Al-Hawari, E.: Exploiting snmp-mib data to detect network anomalies using machine learning techniques. In: Proceedings of SAI Intelligent Systems Conference, pp. 991–1004. Springer (2018). Al-Naymat, G.; Al-Kasassbeh, M.; Al-Hawari, E.: Exploiting snmp-mib data to detect network anomalies using machine learning techniques. In: Proceedings of SAI Intelligent Systems Conference, pp. 991–1004. Springer (2018).
12.
Zurück zum Zitat Alkasassbeh, M.: An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods. arXiv preprint arXiv:1712.09623 (2017). Alkasassbeh, M.: An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods. arXiv preprint arXiv:​1712.​09623 (2017).
13.
Zurück zum Zitat Al-Naymat, G.; Al-Kasassbeh, M.; Al-Harwari, E.: Using machine learning methods for detecting network anomalies within snmp-mib dataset. Int. J. Wirel. Mobile Comput. 15(1), 67–76 (2018)CrossRef Al-Naymat, G.; Al-Kasassbeh, M.; Al-Harwari, E.: Using machine learning methods for detecting network anomalies within snmp-mib dataset. Int. J. Wirel. Mobile Comput. 15(1), 67–76 (2018)CrossRef
14.
Zurück zum Zitat Peng, Y.; Su, J.; Shi, X.; Zhao, B.: Evaluating deep learning based network intrusion detection system in adversarial environment. In: 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 61–66. IEEE (2019). Peng, Y.; Su, J.; Shi, X.; Zhao, B.: Evaluating deep learning based network intrusion detection system in adversarial environment. In: 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 61–66. IEEE (2019).
15.
Zurück zum Zitat Yang, K.; Liu, J.; Zhang, C.; Fang, Y.: Adversarial examples against the deep learning based network intrusion detection systems. In: MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp. 559–564. IEEE (2018) Yang, K.; Liu, J.; Zhang, C.; Fang, Y.: Adversarial examples against the deep learning based network intrusion detection systems. In: MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp. 559–564. IEEE (2018)
16.
Zurück zum Zitat Papadopoulos, P.; Thornewill von Essen, O.; Pitropakis, N.; Chrysoulas, C.; Mylonas, A.; Buchanan, W.J.: Launching adversarial attacks against network intrusion detection systems for iot. J. Cybersecur. Privacy, 1(2):252–273 (2021). Papadopoulos, P.; Thornewill von Essen, O.; Pitropakis, N.; Chrysoulas, C.; Mylonas, A.; Buchanan, W.J.: Launching adversarial attacks against network intrusion detection systems for iot. J. Cybersecur. Privacy, 1(2):252–273 (2021).
17.
Zurück zum Zitat Martins, N.; Cruz, J. M.; Cruz, T.; Abreu, P. H.: Analyzing the footprint of classifiers in adversarial denial of service contexts. In: EPIA Conference on Artificial Intelligence, pp. 256–267. Springer (2019). Martins, N.; Cruz, J. M.; Cruz, T.; Abreu, P. H.: Analyzing the footprint of classifiers in adversarial denial of service contexts. In: EPIA Conference on Artificial Intelligence, pp. 256–267. Springer (2019).
18.
Zurück zum Zitat Pawlicki, M.; Choraś, M.; Kozik, R.: Defending network intrusion detection systems against adversarial evasion attacks. Futur. Gener. Comput. Syst. 110, 148–154 (2020)CrossRef Pawlicki, M.; Choraś, M.; Kozik, R.: Defending network intrusion detection systems against adversarial evasion attacks. Futur. Gener. Comput. Syst. 110, 148–154 (2020)CrossRef
19.
Zurück zum Zitat Qiu, H.; Dong, T.; Zhang, T.; Jialiang, L.; Memmi, G.; Qiu, M.: Adversarial attacks against network intrusion detection in iot systems. IEEE Internet Things J. 8(13), 10327–10335 (2021)CrossRef Qiu, H.; Dong, T.; Zhang, T.; Jialiang, L.; Memmi, G.; Qiu, M.: Adversarial attacks against network intrusion detection in iot systems. IEEE Internet Things J. 8(13), 10327–10335 (2021)CrossRef
20.
Zurück zum Zitat Vitorino, J.; Oliveira, N.; Praça, I.: Adaptative perturbation patterns: Realistic adversarial learning for robust intrusion detection. Fut. Internet 14(4), 108 (2022)CrossRef Vitorino, J.; Oliveira, N.; Praça, I.: Adaptative perturbation patterns: Realistic adversarial learning for robust intrusion detection. Fut. Internet 14(4), 108 (2022)CrossRef
21.
Zurück zum Zitat Al-Kasassbeh, M.; Al-Naymat, G.; Al-Hawari, E.: Towards generating realistic snmp-mib dataset for network anomaly detection. Int. J. Comput. Sci. Inf. Secur. 14(9), 1162 (2016) Al-Kasassbeh, M.; Al-Naymat, G.; Al-Hawari, E.: Towards generating realistic snmp-mib dataset for network anomaly detection. Int. J. Comput. Sci. Inf. Secur. 14(9), 1162 (2016)
22.
Zurück zum Zitat Machado, G.R.; Silva, E.; Goldschmidt, R.R.: Adversarial machine learning in image classification: a survey toward the defender’s perspective. ACM Comput. Surv. (CSUR) 55(1), 1–38 (2021)CrossRef Machado, G.R.; Silva, E.; Goldschmidt, R.R.: Adversarial machine learning in image classification: a survey toward the defender’s perspective. ACM Comput. Surv. (CSUR) 55(1), 1–38 (2021)CrossRef
23.
Zurück zum Zitat Kurakin, A.; Goodfellow, I. J; Bengio, S.: Adversarial examples in the physical world. In: Artificial Intelligence Safety and Security, pp. 99–112. Chapman and Hall/CRC (2018) Kurakin, A.; Goodfellow, I. J; Bengio, S.: Adversarial examples in the physical world. In: Artificial Intelligence Safety and Security, pp. 99–112. Chapman and Hall/CRC (2018)
24.
Zurück zum Zitat Dong, Y.; Liao, F.; Pang, T.; Su, H.; Zhu, J.; Hu, X.; Li, J.: Boosting adversarial attacks with momentum. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9185–9193 (2018). Dong, Y.; Liao, F.; Pang, T.; Su, H.; Zhu, J.; Hu, X.; Li, J.: Boosting adversarial attacks with momentum. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9185–9193 (2018).
25.
Zurück zum Zitat Madry, A.; Makelov, A.; Schmidt, L.; Tsipras, D.; Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017). Madry, A.; Makelov, A.; Schmidt, L.; Tsipras, D.; Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:​1706.​06083 (2017).
26.
Zurück zum Zitat Uesato, J.; O’donoghue, B.; Kohli, P.; Oord, A.: Adversarial risk and the dangers of evaluating against weak attacks. In: International Conference on Machine Learning, pp. 5025–5034. PMLR (2018) Uesato, J.; O’donoghue, B.; Kohli, P.; Oord, A.: Adversarial risk and the dangers of evaluating against weak attacks. In: International Conference on Machine Learning, pp. 5025–5034. PMLR (2018)
Metadaten
Titel
A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks
verfasst von
Yasmeen Alslman
Mouhammd Alkasassbeh
Mohammad Almseidin
Publikationsdatum
11.10.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 3/2024
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-023-08315-5

Weitere Artikel der Ausgabe 3/2024

Arabian Journal for Science and Engineering 3/2024 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

Performance-Aware Big Data Management for Remote Sensing Systems

Research Article-Computer Engineering and Computer Science

Blockchain Based n-party Virtual Payment Model with Concurrent Execution

Research Article-Computer Engineering and Computer Science

SEBR: Scharr Edge-Based Regularization Method for Blind Image Deblurring

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.