XAI-driven Adversarial Attacks on Network Intrusion Detectors

  • Satoshi Okada
  • , Houda Jmila
  • , Kunio Akashi
  • , Takuho Mitsunaga
  • , Yuji Sekiya
  • , Hideki Takase
  • , Gregory Blanc
  • , Hiroshi Nakamura

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Deep Learning (DL) technologies have recently gained significant attention and have been applied to Network Intrusion Detection Systems (NIDS). However, DL is known to be vulnerable to adversarial attacks, which evade detection by introducing perturbations to input data. Meanwhile, eXplainable Artificial Intelligence (XAI) helps us to understand predictions made by DL models and is an essential technology for ensuring accountability. This paper focuses on the relationship between the DL model's decision-making processes and adversarial examples (AEs) and proposes a new AE generation method based on XAI. Our method utilizes XAI to identify important features when making predictions and perturb them in real (traffic) space to evade detection by DL-based NIDS. We implemented our proposed method in a real-world network environment. We confirmed that our AEs completely evade detection without compromising the malicious nature of the attack communications. This experiment reveals that, unlike many existing studies, our proposed method is feasible in the traffic space.

Original languageEnglish
Title of host publicationProceedings of the 2024 European Interdisciplinary Cybersecurity Conference, EICC 2024
EditorsKovila Coopamootoo, Michael Sirivianos
PublisherAssociation for Computing Machinery
Pages65-73
Number of pages9
ISBN (Electronic)9798400716515
DOIs
Publication statusPublished - 5 Jun 2024
Event2024 European Interdisciplinary Cybersecurity Conference, EICC 2024 - Xanthi, Greece
Duration: 5 Jun 20246 Jun 2024

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2024 European Interdisciplinary Cybersecurity Conference, EICC 2024
Country/TerritoryGreece
CityXanthi
Period5/06/246/06/24

Keywords

  • Adversarial Example
  • Cyber Security
  • NIDS
  • XAI

Fingerprint

Dive into the research topics of 'XAI-driven Adversarial Attacks on Network Intrusion Detectors'. Together they form a unique fingerprint.

Cite this