TY - JOUR
T1 - Adversarial Attacks for Intrusion Detection Based on Bus Traffic
AU - He, Daojing
AU - Dai, Jiayu
AU - Liu, Xiaoxia
AU - Zhu, Shanshan
AU - Chan, Sammy
AU - Guizani, Mohsen
PY - 2022/7
Y1 - 2022/7
N2 - A communication bus is used to transmit electronic signals between components, realize functional integration through information sharing, and improve system efficiency. The current research on intrusion detection based on bus traffic is mainly pertaining to machine learning or time logic detection. However, recent studies have shown that machine learning models perform poorly in defense of various adversarial attacks. In this article, we propose a method based on generative adversarial networks to transform normal traffic into adversarial and malicious ones. To be closer to reality, adversarial example generation models on two threat scenarios are proposed. At the same time, the distance metric L2 is introduced in the loss function to ensure the authenticity of the generated adversarial examples. To evaluate our method, we use the traffic generated by the model to various intrusion detection systems based on bus. Experimental results show that the model is effective because the detection rate of different intrusion detection models decreases after the traffic is processed. Thus, the traffic generated by our models can be used as training data to enhance the accuracy of intrusion detection systems.
AB - A communication bus is used to transmit electronic signals between components, realize functional integration through information sharing, and improve system efficiency. The current research on intrusion detection based on bus traffic is mainly pertaining to machine learning or time logic detection. However, recent studies have shown that machine learning models perform poorly in defense of various adversarial attacks. In this article, we propose a method based on generative adversarial networks to transform normal traffic into adversarial and malicious ones. To be closer to reality, adversarial example generation models on two threat scenarios are proposed. At the same time, the distance metric L2 is introduced in the loss function to ensure the authenticity of the generated adversarial examples. To evaluate our method, we use the traffic generated by the model to various intrusion detection systems based on bus. Experimental results show that the model is effective because the detection rate of different intrusion detection models decreases after the traffic is processed. Thus, the traffic generated by our models can be used as training data to enhance the accuracy of intrusion detection systems.
KW - Intrusion detection
KW - Protocols
KW - Generative adversarial networks
KW - Security
KW - Ions
KW - Training
KW - Data models
UR - http://www.scopus.com/inward/record.url?scp=85137569121&partnerID=8YFLogxK
UR - http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000846292100001
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-85137569121&origin=recordpage
U2 - 10.1109/MNET.105.2100353
DO - 10.1109/MNET.105.2100353
M3 - RGC 21 - Publication in refereed journal
SN - 0890-8044
VL - 36
SP - 203
EP - 209
JO - IEEE Network
JF - IEEE Network
IS - 4
ER -