Journal on Communications ›› 2021, Vol. 42 ›› Issue (11): 1-12.doi: 10.11959/j.issn.1000-436x.2021193

• Topics: New Technology of Computer Communication and Network System Security •     Next Articles

Application of adversarial machine learning in network intrusion detection

Qixu LIU1,2, Junnan WANG1,2, Jie YIN1, Yanhui CHEN1,2, Jiaxi LIU1,2   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
  • Revised:2021-09-15 Online:2021-11-25 Published:2021-11-01
  • Supported by:
    The Youth Innovation Promotion Association CAS(2019163);The National Natural Science Foundation of China(61902396);The Strategic Priority Research Program of Chinese Academy of Sciences(XDC02040100);The Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network Security and Protection Technology

Abstract:

In recent years, machine learning (ML) has become the mainstream network intrusion detection system(NIDS).However, the inherent vulnerabilities of machine learning make it difficult to resist adversarial attacks, which can mislead the models by adding subtle perturbations to the input sample.Adversarial machine learning (AML) has been extensively studied in image recognition.In the field of intrusion detection, which is inherently highly antagonistic, it may directly make ML-based detectors unavailable and cause significant property damage.To deal with such threats, the latest work of applying AML technology was systematically investigated in NIDS from two perspectives: attack and defense.First, the unique constraints and challenges were revealed when applying AML technology in the NIDS field; secondly, a multi-dimensional taxonomy was proposed according to the adversarial attack stage, and current work was compared and summarized on this basis; finally, the future research directions was discussed.

Key words: intrusion detection, malicious traffic, adversarial attack, adversarial defense

CLC Number: 

No Suggested Reading articles found!