Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

@article{Homoliak2019ImprovingNI,
  title={Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach},
  author={Ivan Homoliak and Martin Teknos and Mart{\'i}n Ochoa and Dominik Breitenbacher and Saeid Hosseini and Petr Han{\'a}cek},
  journal={ICST Trans. Security Safety},
  year={2019},
  volume={5},
  pages={e4}
}
Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time, they may be susceptible to evasion by obfuscation techniques. An adversary intruder which possesses a crucial knowledge about a protection system can easily bypass the detection module. The main objective of our work is to improve the performance capabilities of intrusion detection classifiers against such adversaries. To this end, we firstly propose several obfuscation techniques of… CONTINUE READING
4
Twitter Mentions

Figures, Tables, Results, and Topics from this paper.

Key Quantitative Results

  • Finally, we test the capability of an obfuscations-aware classifier to detect unknown obfuscated attacks, where we achieve over 90% detection rate on average for most of the obfuscations.

References

Publications referenced by this paper.
SHOWING 1-10 OF 29 REFERENCES

Network Emulation with NetEm

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Audio Adversarial Examples: Targeted Attacks on Speech-to-Text

  • 2018 IEEE Security and Privacy Workshops (SPW)
  • 2018
VIEW 1 EXCERPT

Intrusion Detection in Network Traffic. Dissertation, Faculty of Information Technology, University of Technology Brno. doi:10.13140/RG.2.2.25780.24963/1

I. Homoliak
  • 2016
VIEW 1 EXCERPT

Characteristics of buffer overflow attacks tunneled in HTTP traffic

  • 2014 International Carnahan Conference on Security Technology (ICCST)
  • 2014
VIEW 1 EXCERPT

NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic

  • The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)
  • 2014
VIEW 1 EXCERPT