The surge in the internet of things (IoT) devices seriously threatens the current IoT security landscape, which requires a robust network intrusion detection system (NIDS). Despite superior detection accuracy, existing machine learning or deep learning based NIDS are vulnerable to adversarial examples. Recently, generative adversarial networks (GANs) have become a prevailing method in adversarial examples crafting. However, the nature of discrete network traffic at the packet level makes it hard for GAN to craft adversarial traffic as GAN is efficient in generating continuous data like image synthesis. Unlike previous methods that convert discrete network traffic into a grayscale image, this paper gains inspiration from SeqGAN in sequence generation with policy gradient. Based on the structure of SeqGAN, we propose Attack-GAN to generate adversarial network traffic at packet level that complies with domain constraints. Specifically, the adversarial packet generation is formulated into a sequential decision making process. In this case, each byte in a packet is regarded as a token in a sequence. The objective of the generator is to select a token to maximize its expected end reward. To bypass the detection of NIDS, the generated network traffic and benign traffic are classified by a black-box NIDS. The prediction results returned by the NIDS are fed into the discriminator to guide the update of the generator. We generate malicious adversarial traffic based on a real public available dataset with attack functionality unchanged. The experimental results validate that the generated adversarial samples are able to deceive many existing black-box NIDS.
翻译:尽管检测准确性较高,但现有的机器学习或深入学习的NIDS很容易成为对抗性实例。最近,基因对抗性网络(GANs)已成为编造对抗性范例的流行方法。然而,由于软件包层面的离散网络流量的性质,GAN很难制造对抗性通信流量,因为GAN在生成像图像合成一样的连续数据方面效率很高。与以往将离散网络流量转换成灰度图像的方法不同,本文在政策梯度的序列生成中从SeqeGAN获得灵感。基于SeqGAN的结构,我们建议攻击-GAN在符合域限制的组合水平上生成对抗性网络流量。具体地说,对立网络生成形成一个顺序决策程序。在本案中,每袋中的每一字节都被视为一个象征。能够使服务器选择一个标志,以尽可能扩大其预期目的奖赏。在对NIDSDS的序列中,我们生成了不固定的互联网流量,而我们通过将现有的互联网版本转换成一个不动性数据库。