论文标题
纳塔克!对抗性攻击,以绕过经过训练以检测网络入侵的基于GAN的分类器
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
论文作者
论文摘要
随着人工智能和机器学习的最新发展,可以使用机器学习方法检测到网络流量的异常。在机器学习兴起之前,使用精心制作的规则检测到可能暗示攻击的网络异常。在网络防卫领域拥有知识的攻击者可以使有根据的猜测有时准确预测网络交通数据的网络交通数据的特定特征。有了这些信息,攻击者可以规避基于规则的网络防御系统。但是,在网络异常的机器学习进步之后,人类不容易理解如何绕过网络防卫系统。最近,对抗机器学习算法已经越来越普遍。在本文中,我们表明,即使我们构建分类器并使用对抗性示例进行网络数据训练,我们也可以使用对抗性攻击并成功破坏系统。我们建议基于生成的对抗网络(GAN)算法生成数据以训练有效的基于神经网络的分类器,然后我们随后使用对抗性攻击破坏了系统。
With the recent developments in artificial intelligence and machine learning, anomalies in network traffic can be detected using machine learning approaches. Before the rise of machine learning, network anomalies which could imply an attack, were detected using well-crafted rules. An attacker who has knowledge in the field of cyber-defence could make educated guesses to sometimes accurately predict which particular features of network traffic data the cyber-defence mechanism is looking at. With this information, the attacker can circumvent a rule-based cyber-defense system. However, after the advancements of machine learning for network anomaly, it is not easy for a human to understand how to bypass a cyber-defence system. Recently, adversarial attacks have become increasingly common to defeat machine learning algorithms. In this paper, we show that even if we build a classifier and train it with adversarial examples for network data, we can use adversarial attacks and successfully break the system. We propose a Generative Adversarial Network(GAN)based algorithm to generate data to train an efficient neural network based classifier, and we subsequently break the system using adversarial attacks.