Abstract
In the current digital era, the development and advancement of various technologies such as cloud computing, edge computing, the Internet of Things, etc., have benefited users and organizations in numerous ways. Though several security mechanisms are used to protect computing systems and networks from attacks, they are insufficient and lack the capability to handle new attacks developed at a breakneck pace. Machine learning poses a potential solution. However, its vulnerability to attacks by adversaries can cause severe attacks to escape the detection process and gain access to the network. To build a robust intrusion detection system, in this paper, we have experimented on the NSL-KDD dataset and used different machine learning techniques to identify and detect the attacks in it and in the adversarial test dataset that contains attacks generated with attack generation methods. The performance of the machine learning techniques reduces drastically with the adversarial data, making it necessary to implement a defense strategy against the attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Qureshi AUH, Larijani H, Mtetwa N, Yousefi M, Javed A (2020) An adversarial attack detection paradigm with swarm optimization. In: Proceedings of the international joint conference on neural networks. IEEE. Glasgow, UK
Alatwi HA, Morisset C (2021) Adversarial machine learning in network intrusion detection domain: a systematic review. http://arxiv.org/abs/2112.03315, pp 1–21
Alhajjar E, Maxwell P, Bastian N (2021) Adversarial machine learning in network intrusion detection systems. Expert systems with applications, vol 186. Elsevier Ltd. p 115782
Martins N, Cruz JM, Cruz T, Abreu PH (2019) Analyzing the footprint of classifiers in adversarial denial of service contexts. In: Artificial intelligence and lecture notes in bioinformatics, vol 11805. LNCS, pp 256–267
Zhu Q, Sun Z, Liang X, Xiong Y, Zhang L (2020) A survey of adversarial learning on graph. 35th IEEE/ACM Int Conf Autom Softw Eng 37(4):883–894. Melbourne, VIC, Australia
Zeng G, Qi F, Zhou Q, Zhang T, Ma Z, Hou B, Zang Y, Liu Z, Sun M (2021) OpenAttack: an open-source textual adversarial attack toolkit. In: 59th annual meeting of association for computational linguistics and the 11th international joint conference on natural language processing, proceedings of the system demonstrations, pp 363–371
Khamis RA, Matrawy A (2020) Evaluation of adversarial training on different types of neural networks in deep learning-based IDSs. In: International symposium on networks, computers, and communications. IEEE, Montreal, QC, Canada, pp 1–6
Zheng H, Zhang Z, Gu J, Lee H, Prakash A (2020) Efficient adversarial training with transferable adversarial examples. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition. IEEE, Seattle, WA, USA, pp 1178–1187
Wang Y, Ma X, Bailey J, Yi J, Zhou B, Gu Q (2019) On the convergence and robustness of adversarial training. In: 36th international conference on machine learning. PMLR 97, Long Beach, California, pp 11426–11438
Martins N, Cruz JM, Cruz T, Henriques Abreu P (2020) Adversarial machine learning applied to intrusion and malware scenarios: a systematic review. IEEE Access 8:35403–35419
Mccarthy A, Andriotis P, Ghadafi E, Legg P (2021) Feature vulnerability and robustness assessment against adversarial machine learning attacks. In: 2021 international conference on cyber situational awareness, data analytics, and assessment. Dublin, Ireland, pp 1–8
Benzaid C, Boukhalfa M, Taleb T (May 2020) Robust self-protection against application-layer (D)DoS attacks in SDN environment. In: IEEE wireless communications and networking conference. IEEE, Seoul, Korea (South)
Jeong JH, Kwon S, Hong MP, Kwak J, Shon T (2020) Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance. Multimedia Tools Appl 79(23–24):16077–16091
Qureshi AUH, Larijani H, Yousefi M, Adeel A, Mtetwa N (2020) An adversarial approach for intrusion detection systems using jacobian saliency map attacks (JSMA) algorithm. MDPI Comput 9(3):1–14
Tcydenova E, Kim TW, Lee C, Park JH (2021) Detection of adversarial attacks in ai-based intrusion detection systems using explainable AI. HCIS 11(35):1–13
Yin C, Zhu Y, Liu S, Fei J, Zhang H (2020) Enhancing network intrusion detection classifiers using supervised adversarial training. J Supercomputing 76(9):6690–6719
Peng Y, Su J, Shi X, Zhao B (2019) Evaluating deep learning based network intrusion detection system in adversarial environment. In: 9th international conference on electronics information and emergency communication. IEEE, Beijing, China, pp 61–66
Alzantot M, Sharma Y, Chakraborty S, Zhang H, Hsieh C-J, Srivastava MB (2019) GenAttack: practical black-box attacks with gradient-free optimization. In: GECCO’19. Prague, Czech Republic, pp 1111–1119
Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. In: 2nd international conference on learning representations. Banff, AB, Canada, pp 1–10
Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: 3rd international conference on learning representations. San Diego, CA, USA, pp 1–11
Pawar Y, Amayri M, Bouguila N (2021) Performance evaluation of adversarial learning for anomaly detection using mixture models. In: Proceedings of the IEEE international conference on industrial technology, March. IEEE, Valencia, Spain, pp 913–918
Wong E, Rice L, Kolter JZ (2020) Fast is better than free: revisiting adversarial training. ICLR, pp 1–17. http://arxiv.org/abs/2001.03994
Nicolas Papernot N, Carlini N, Goodfellow I, Feinman R, Faghri F, Matyasko A, Hambardzumyan K, Juang Y, Kurakin A, Sheatsley R, Garg A, Lin Y, Hendricks P, McDaniel P (2016) Cleverhans v2.0.0 an adversarial machine learning library, pp. 1–7. http://arxiv.org/abs/1610.00768
Mukeri AF, Gaikwad DP (2022) Adversarial machine learning attacks and defenses in network intrusion detection systems. I J Wireless Microwave Technol MECS 1(2):12–21
Debicha I, Debatty T, Dricot J-M, Mees W (2021) Adversarial training for deep learning-based intrusion detection systems. The sixteenth international conference on systems ICONS 202. Porto, Portugal
Ren K, Zheng T, Qin Z, Liu X (2020) Adversarial attacks and defenses in deep learning. Eng Elsevier 6(3):346–360
Bai T, Luo J, Zhao J, Wen B, Wang Q (2021) Recent advances in adversarial training for adversarial robustness. Int Joint Conf Artif Intell 2:4312–4321. Montreal, Canada
Yang K, Liu J, Zhang C, Fang Y (2019) Adversarial examples against the deep learning based network intrusion detection systems. In: Proceedings—IEEE military communications conference MILCOM, vol 10. Los Angeles, CA, USA, pp 559–564
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mulimani, M., Rachh, R., Kavatagi, S. (2023). A Comparative Approach: Machine Learning and Adversarial Learning for Intrusion Detection. In: Yadav, R.P., Nanda, S.J., Rana, P.S., Lim, MH. (eds) Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-8742-7_39
Download citation
DOI: https://doi.org/10.1007/978-981-19-8742-7_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8741-0
Online ISBN: 978-981-19-8742-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)