Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions

Rongqian Zhang, Senlin Luo*, Limin Pan, Jingwei Hao, Ji Zhang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)

Abstract

Well-crafted adversarial examples can easily deceive neural network models into producing misclassified results while contributing to evaluating and improving the performance and robustness of the classification model. However, most adversarial examples generation methods still have the following drawbacks: (1) the original samples ignore the distribution regularity of benign samples and directly add noise, so the generated adversarial examples have significant differences in latent spatial distribution with benign samples, which makes them difficult to escape detection; (2) the discriminant features of the adversarial examples are directly modified, which causes their malicious patterns to change or malicious functions to be unattainable. In this paper, a novel malicious traffic adversarial examples generation method, NIDSFM, is proposed. Through NIDSFM, the feature space of the traffic samples is reconstructed to avoid interference with the malicious functions of the generated adversarial examples by isolating the discriminant features. By using the ability of the flow-based model to represent the latent space distribution, the distribution of adversarial examples is modeled around the benign samples, then fine-tuned based on generative adversarial networks (GAN) with additional latent spatial noise so that the distribution of generated adversarial examples is similar to benign samples. Extensive experiments were conducted on multiple datasets (NSL-KDD, UNSW-NB15, CIC-DDoS2019) and compared with various adversarial examples generation methods. The experimental results show that the proposed method leads to a significant reduction in the detection rate of multiple NIDSs and is competitive in escaping NIDS detection.

Original languageEnglish
Pages (from-to)413-430
Number of pages18
JournalNeurocomputing
Volume490
DOIs
Publication statusPublished - 14 Jun 2022

Keywords

  • Adversarial attack
  • Flow-based model
  • Generate adversarial examples
  • Generative adversarial networks
  • Intrusion detection systems

Fingerprint

Dive into the research topics of 'Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions'. Together they form a unique fingerprint.

Cite this