The surge in the internet of things (IoT) devices seriously threatens the current IoT security landscape, which requires a robust network intrusion detection system (NIDS). Despite superior detection accuracy, existing machine learning or deep learning based NIDS are vulnerable to adversarial examples. Recently, generative adversarial networks (GANs) have become a prevailing method in adversarial examples crafting. However, the nature of discrete network traffic at the packet level makes it hard for GAN to craft adversarial traffic as GAN is efficient in generating continuous data like image synthesis. Unlike previous methods that convert discrete network traffic into a grayscale image, this paper gains inspiration from SeqGAN in sequence generation with policy gradient. Based on the structure of SeqGAN, we propose Attack-GAN to generate adversarial network traffic at packet level that complies with domain constraints. Specifically, the adversarial packet generation is formulated into a sequential decision making process. In this case, each byte in a packet is regarded as a token in a sequence. The objective of the generator is to select a token to maximize its expected end reward. To bypass the detection of NIDS, the generated network traffic and benign traffic are classified by a black-box NIDS. The prediction results returned by the NIDS are fed into the discriminator to guide the update of the generator. We generate malicious adversarial traffic based on a real public available dataset with attack functionality unchanged. The experimental results validate that the generated adversarial samples are able to deceive many existing black-box NIDS.
翻译:物联网设备的激增严重威胁了当前物联网安全格局,需要一个强大的网络入侵检测系统(NIDS)。尽管现有的基于机器学习或深度学习的NIDS具有更高的检测准确性,但是它们容易受到对手生成的样本的影响。最近,生成对抗网络(GANs)已成为对手生成的方法中的一种主流方法。但是,数据包级别上离散的网络流量的特性使得GAN难以生成与实际网络流量相似的对手生成的流量,因为GAN在生成诸如图像合成之类的连续数据方面非常高效。与以往将离散网络流量转换为灰度图像的方法不同,本文从SeqGAN的策略梯度生成中获得启示,提出了Attack-GAN用于生成符合域限制的数据包级对抗网络流量。具体地,对手生成过程被形式化为序列决策过程。在这种情况下,数据包中的每个字节被视为序列中的一个令牌。生成器的目标是选择一个令牌以最大化其期望的末端奖励。为了绕过NIDS的检测,生成的网络流量和良性流量都将由一个黑盒NIDS进行分类。NIDS返回的预测结果将被馈入鉴别器以指导生成器的更新。我们以攻击功能保持不变的真实公共可用数据集为基础生成恶意对手生成的流量。实验结果验证了所生成的对手生成的样本能够欺骗许多现有的黑盒NIDS。