MANDA: On Adversarial Example Detection for Network Intrusion Detection System

Ning Wang, Yimin Chen, Yang Xiao, Yang Hu, Wenjing Lou, Y. Thomas Hou

Research output: Contribution to journalArticlepeer-review

47 Scopus citations

Abstract

With the rapid advancement in machine learning (ML), ML-based Intrusion Detection Systems (IDSs) are widely deployed to protect networks from various attacks. One of the biggest challenges is that ML-based IDSs suffer from adversarial example (AE) attacks. By applying small perturbations (e.g., slightly increasing packet inter-arrival time) to the intrusion traffic, an AE attack can flip the prediction of a well-trained IDS. We address this challenge by proposing MANDA, a MANifold and Decision boundary-based AE detection system. Through analyzing AE attacks, we notice that 1) an AE tends to be close to its original manifold (i.e., the cluster of samples in its original class) regardless of which class it is misclassified into; and 2) AEs tend to be close to the decision boundary to minimize the perturbation scale. Based on the two observations, we design MANDA for accurate AE detection by exploiting inconsistency between manifold evaluation and IDS model inference and evaluating model uncertainty on small perturbations. We evaluate MANDA on both binary IDS and multi-class IDS on two datasets (NSL-KDD and CICIDS) under three state-of-the-art AE attacks. Our experimental results show that MANDA achieves high true-positive rate (98.41%) with a 5% false-positive rate.

Original languageEnglish
Pages (from-to)1139-1153
Number of pages15
JournalIEEE Transactions on Dependable and Secure Computing
Volume20
Issue number2
DOIs
StatePublished - Mar 1 2023

Bibliographical note

Publisher Copyright:
© 2004-2012 IEEE.

Keywords

  • AE detection
  • Adversarial example (AE)
  • intrusion detection system

ASJC Scopus subject areas

  • General Computer Science
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'MANDA: On Adversarial Example Detection for Network Intrusion Detection System'. Together they form a unique fingerprint.

Cite this