Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems

Haonan Yan,Xiaoguang Li,Wenjing Zhang,Rui Wang,Hui Li,Xingwen Zhao,Fenghua Li,Xiaodong Lin
DOI: https://doi.org/10.1109/tdsc.2023.3247585
2023-01-01
IEEE Transactions on Dependable and Secure Computing
Abstract:Network intrusion detection systems (IDS) are often considered effective to thwart cyber attacks. Currently, state-of-the-art (SOTA) IDSs are mainly based on machine learning (ML) including deep learning (DL) models, which suffer from their own security issues, especially evasion attacks by using adversarial examples. However, previous studies mostly focus on extracted features rather than the traffic sample itself, and/or assume that the adversary knows the information of the target model more or less, which severely restricts attack feasibility in practice. In this paper, we re-investigate this problem in a more realistic label-only black-box scenario and propose a practical evasion attack strategy to solve the above limitations. In this newly considered case that the adversary morphs the traffic sample and only obtains the results accepted or rejected without other knowledge, we successfully leverage the model extraction and transfer attack to evade the detection. The entire attack strategy is automated and a comprehensive evaluation is performed. Final results show that the proposed strategy effectively evades seven typical ML-based IDSs and one SOTA DL-based IDS with an average success rate of over $75\%$ . We also discuss the corresponding countermeasures against our attack, which finally highlight the need for effective defenses against our attack.
What problem does this paper attempt to address?