Network intrusion detection systems (NIDS) are an essential defense for computer networks and the hosts within them. Machine learning (ML) nowadays predominantly serves as the basis for NIDS decision making, where models are tuned to reduce false alarms, increase detection rates, and detect known and unknown attacks. At the same time, ML models have been found to be vulnerable to adversarial examples that undermine the downstream task. In this work, we ask the practical question of whether real-world ML-based NIDS can be circumvented by crafted adversarial flows, and if so, how can they be created. We develop the generative adversarial network (GAN)-based attack algorithm NIDSGAN and evaluate its effectiveness against realistic ML-based NIDS. Two main challenges arise for generating adversarial network traffic flows: (1) the network features must obey the constraints of the domain (i.e., represent realistic network behavior), and (2) the adversary must learn the decision behavior of the target NIDS without knowing its model internals (e.g., architecture and meta-parameters) and training data. Despite these challenges, the NIDSGAN algorithm generates highly realistic adversarial traffic flows that evade ML-based NIDS. We evaluate our attack algorithm against two state-of-the-art DNN-based NIDS in whitebox, blackbox, and restricted-blackbox threat models and achieve success rates which are on average 99%, 85%, and 70%, respectively. We also show that our attack algorithm can evade NIDS based on classical ML models including logistic regression, SVM, decision trees and KNNs, with a success rate of 70% on average. Our results demonstrate that deploying ML-based NIDS without careful defensive strategies against adversarial flows may (and arguably likely will) lead to future compromises.
翻译:网络入侵探测系统(NIDS)是计算机网络及其内部主机的基本防御系统。现在机器学习(ML)主要作为NIDS决策的基础,模型在其中调整,以减少假警报,提高探测率,并发现已知和未知袭击。与此同时,发现ML模型容易受到破坏下游任务的敌对例子的影响。在这项工作中,我们询问基于真实世界ML的NIDS能否被编造的对抗性流动所绕过,如果能够,如何建立这样的系统。我们开发基于基因化的对抗性网络(GAN)攻击算法 NIDSGAN,并评估其相对于现实的ML-NIDS的效用。产生对抗性网络流动的两大挑战:(1) 网络特征必须服从域的制约(即代表现实的网络行为),(2) 对手必须了解以真实世界为主的NIDSDS的判断行为,而没有了解基于模型的内部(例如,建筑和元数据标准)和训练数据。尽管存在这些挑战, NIDSGAN 算法对基于我们的平均攻击率的80-IMDS的系统运行速度进行高现实化分析, 显示我们平均的IMDR 的NL 运行速度显示我们的平均比率。