Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 12/2019

20.02.2019 | Original Article

Automatically synthesizing DoS attack traces using generative adversarial networks

verfasst von: Qiao Yan, Mingde Wang, Wenyao Huang, Xupeng Luo, F. Richard Yu

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 12/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Artificial intelligence (AI) technology ruling people is still the scene in the science fiction film, but hackers using AI technology against existing security measures is an inescapable trend. Network intrusion detection systems (NIDS) based deep learning such as convolutional neural network (CNN) have reached a very high detection rate. But we propose DoS-WGAN, a common architecture that uses the Wasserstein generative adversarial networks (WGAN) with gradient penalty technology to evade network traffic Classifiers. To camouflage offensive denial of service (DoS) attack traffic as normal network traffic, DoS-WGAN automatically synthesizes attack traces that can defeat a existing NIDS/network security defense for DoS cases. Information entropy is used to measure the dispersing performance of generated DoS attack traffic. The generated DoS attack traffic is so similar to the normal traffic that detection algorithm cannot distinguish between them. When we input the generated DoS attack traffic to a NIDS based on CNN in our experiments, the detection rate drops to \(47.6\%\) from \(97.3\%\). To make the training more stable, we integrate the Standardized Euclidean distance and the information entropy to evaluate the training process. We believe that AI technology will play a particularly important role in the game of network attack and defense.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Arjovsky M, Bottou L (2017) Towards principled methods for training generative adversarial networks. arXiv preprint arXiv:170104862 Arjovsky M, Bottou L (2017) Towards principled methods for training generative adversarial networks. arXiv preprint arXiv:​170104862
3.
Zurück zum Zitat Bi J, Zhang K, Cheng X (2009) Intrusion detection based on RBF neural network. In: International symposium on information engineering and electronic commerce, IEEC’09. IEEE, New York, pp 357–360 Bi J, Zhang K, Cheng X (2009) Intrusion detection based on RBF neural network. In: International symposium on information engineering and electronic commerce, IEEC’09. IEEE, New York, pp 357–360
4.
Zurück zum Zitat Biggio B, Corona I, Maiorca D, Nelson B, Šrndić N, Laskov P, Giacinto G, Roli F (2013) Evasion attacks against machine learning at test time. In: Joint European conference on machine learning and knowledge discovery in databases, vol 8190. Springer, Berlin, pp 387–402CrossRef Biggio B, Corona I, Maiorca D, Nelson B, Šrndić N, Laskov P, Giacinto G, Roli F (2013) Evasion attacks against machine learning at test time. In: Joint European conference on machine learning and knowledge discovery in databases, vol 8190. Springer, Berlin, pp 387–402CrossRef
5.
Zurück zum Zitat Bode MA, Oluwadare SA, Alese BK, Thompson FB (2015) Risk analysis in cyber situation awareness using Bayesian approach. In: 2015 international conference on cyber situational awareness, data analytics and assessment (CyberSA). IEEE, New York, pp 1–12 Bode MA, Oluwadare SA, Alese BK, Thompson FB (2015) Risk analysis in cyber situation awareness using Bayesian approach. In: 2015 international conference on cyber situational awareness, data analytics and assessment (CyberSA). IEEE, New York, pp 1–12
7.
Zurück zum Zitat Canbay Y, Sagiroglu S (2016) A hybrid method for intrusion detection. In: 2015 IEEE 14th international conference on machine learning and applications (ICMLA). IEEE, New York, pp 156–161 Canbay Y, Sagiroglu S (2016) A hybrid method for intrusion detection. In: 2015 IEEE 14th international conference on machine learning and applications (ICMLA). IEEE, New York, pp 156–161
8.
Zurück zum Zitat Chauhan M, Pratap A, Sonika, Dixit A (2015) Designing a technique for detecting intrusion based on modified adaptive resonance theory network. In: 2015 international conference on green computing and internet of things (ICGCIoT). IEEE, New York, pp 448–451 Chauhan M, Pratap A, Sonika, Dixit A (2015) Designing a technique for detecting intrusion based on modified adaptive resonance theory network. In: 2015 international conference on green computing and internet of things (ICGCIoT). IEEE, New York, pp 448–451
9.
Zurück zum Zitat Chordia AS, Gupta S (2016) An effective model for anomaly ids to improve the efficiency. In: 2015 international conference on green computing and internet of things (ICGCIoT). IEEE, New York, pp 190–194 Chordia AS, Gupta S (2016) An effective model for anomaly ids to improve the efficiency. In: 2015 international conference on green computing and internet of things (ICGCIoT). IEEE, New York, pp 190–194
10.
Zurück zum Zitat Fu Y, Zhu Y, Yu H (2009) Study of neural network technologies in intrusion detection systems. In: 5th international conference on wireless communications, networking and mobile computing, WiCom’09. IEEE, New York, pp 4454–4457 Fu Y, Zhu Y, Yu H (2009) Study of neural network technologies in intrusion detection systems. In: 5th international conference on wireless communications, networking and mobile computing, WiCom’09. IEEE, New York, pp 4454–4457
11.
Zurück zum Zitat Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: International conference on neural information processing systems, pp 2672–2680 Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: International conference on neural information processing systems, pp 2672–2680
12.
Zurück zum Zitat Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC (2017) Improved training of Wasserstein GANs. In: Advances in neural information processing systems, pp 5767–5777 Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC (2017) Improved training of Wasserstein GANs. In: Advances in neural information processing systems, pp 5767–5777
13.
Zurück zum Zitat Haykin S (1994) Neural networks: a comprehensive foundation. Prentice Hall PTR, London Haykin S (1994) Neural networks: a comprehensive foundation. Prentice Hall PTR, London
15.
Zurück zum Zitat Jiang J, Zhang C, Kamel M (2003) RBF-based real-time hierarchical intrusion detection systems. In: 2003 proceedings of the international joint conference on neural networks, vol 2(2), pp 1512–1516 Jiang J, Zhang C, Kamel M (2003) RBF-based real-time hierarchical intrusion detection systems. In: 2003 proceedings of the international joint conference on neural networks, vol 2(2), pp 1512–1516
16.
Zurück zum Zitat Khosravi-Farmad M, Ramaki AA, Bafghi AG (2015) Risk-based intrusion response management in IDS using Bayesian decision networks. In: 2015 5th international conference on computer and knowledge engineering (ICCKE). IEEE, New York, pp 307–312 Khosravi-Farmad M, Ramaki AA, Bafghi AG (2015) Risk-based intrusion response management in IDS using Bayesian decision networks. In: 2015 5th international conference on computer and knowledge engineering (ICCKE). IEEE, New York, pp 307–312
17.
Zurück zum Zitat Kingma D, Ba J (2014) Adam: a method for stochastic optimization. Comput Sci Kingma D, Ba J (2014) Adam: a method for stochastic optimization. Comput Sci
18.
Zurück zum Zitat Kumar VD, Radhakrishnan S (2014) Intrusion detection in MANET using self organizing map (SOM). In: 2014 international conference on recent trends in information technology (ICRTIT). IEEE, New York, pp 1–8 Kumar VD, Radhakrishnan S (2014) Intrusion detection in MANET using self organizing map (SOM). In: 2014 international conference on recent trends in information technology (ICRTIT). IEEE, New York, pp 1–8
19.
Zurück zum Zitat Padmadas M, Krishnan N, Kanchana J, Karthikeyan M (2014) Layered approach for intrusion detection systems based genetic algorithm. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, New York, pp 1–4 Padmadas M, Krishnan N, Kanchana J, Karthikeyan M (2014) Layered approach for intrusion detection systems based genetic algorithm. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, New York, pp 1–4
20.
Zurück zum Zitat Sahu S, Mehtre BM (2015) Network intrusion detection system using j48 decision tree. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE, New York, pp 2023–2026 Sahu S, Mehtre BM (2015) Network intrusion detection system using j48 decision tree. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE, New York, pp 2023–2026
21.
Zurück zum Zitat Salimans T, Goodfellow I, Zaremba W, Cheung V, Radford A, Chen X (2016) Improved techniques for training GANs. In: Advances in neural information processing systems, pp 2234–2242 Salimans T, Goodfellow I, Zaremba W, Cheung V, Radford A, Chen X (2016) Improved techniques for training GANs. In: Advances in neural information processing systems, pp 2234–2242
22.
Zurück zum Zitat Senthilnayaki B, Venkatalakshmi K, Kannan A (2015) Intrusion detection using optimal genetic feature selection and svm based classifier. In: 2015 3rd international conference on signal processing, communication and networking (ICSCN). IEEE, New York, pp 1–4 Senthilnayaki B, Venkatalakshmi K, Kannan A (2015) Intrusion detection using optimal genetic feature selection and svm based classifier. In: 2015 3rd international conference on signal processing, communication and networking (ICSCN). IEEE, New York, pp 1–4
24.
Zurück zum Zitat Teng L, Teng S, Tang F, Zhu H, Zhang W, Liu D, Liang L (2015) A collaborative and adaptive intrusion detection based on svms and decision trees. In: 2014 IEEE international conference on data mining workshop (ICDMW). IEEE, New York, pp 898–905 Teng L, Teng S, Tang F, Zhu H, Zhang W, Liu D, Liang L (2015) A collaborative and adaptive intrusion detection based on svms and decision trees. In: 2014 IEEE international conference on data mining workshop (ICDMW). IEEE, New York, pp 898–905
25.
Zurück zum Zitat Villani C (2009) Optimal transport: old and new. In: Grundlehren der mathematischen Wissenschaften. Springer, Berlin Villani C (2009) Optimal transport: old and new. In: Grundlehren der mathematischen Wissenschaften. Springer, Berlin
26.
Zurück zum Zitat Vinayakumar R, Soman K, Poornachandran P (2017) Applying convolutional neural network for network intrusion detection. In: 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE, New York, pp 1222–1228 Vinayakumar R, Soman K, Poornachandran P (2017) Applying convolutional neural network for network intrusion detection. In: 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE, New York, pp 1222–1228
27.
Zurück zum Zitat Wahengbam M, Marchang N (2012) Intrusion detection in MANET using fuzzy logic. In: 2012 3rd national conference on emerging trends and applications in computer science (NCETACS). IEEE, New York, pp 189–192 Wahengbam M, Marchang N (2012) Intrusion detection in MANET using fuzzy logic. In: 2012 3rd national conference on emerging trends and applications in computer science (NCETACS). IEEE, New York, pp 189–192
29.
Zurück zum Zitat Yang Z, Karahoca A, Yang N, Aydin N (2008) Network intrusion detection by using cellular neural network with Tabu search. In: ECSIS symposium on bio-inspired learning and intelligent systems for security, BLISS’08. IEEE, New York, pp 64–68 Yang Z, Karahoca A, Yang N, Aydin N (2008) Network intrusion detection by using cellular neural network with Tabu search. In: ECSIS symposium on bio-inspired learning and intelligent systems for security, BLISS’08. IEEE, New York, pp 64–68
30.
Zurück zum Zitat Zhang XY, Zeng HS, Jia L (2010) Research of intrusion detection system dataset-KDD CUP99. Comput Eng Des 31(22):4809–4805 Zhang XY, Zeng HS, Jia L (2010) Research of intrusion detection system dataset-KDD CUP99. Comput Eng Des 31(22):4809–4805
31.
Zurück zum Zitat Zhu JY, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. arXiv preprint arXiv:170310593 Zhu JY, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. arXiv preprint arXiv:​170310593
Metadaten
Titel
Automatically synthesizing DoS attack traces using generative adversarial networks
verfasst von
Qiao Yan
Mingde Wang
Wenyao Huang
Xupeng Luo
F. Richard Yu
Publikationsdatum
20.02.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 12/2019
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-019-00925-6

Weitere Artikel der Ausgabe 12/2019

International Journal of Machine Learning and Cybernetics 12/2019 Zur Ausgabe

Neuer Inhalt