Verifying the robustness of machine learning based intrusion detection against adversarial perturbation

Ehsan Nowroozi*, Rahim Taheri, Mehrdad Hajizadeh, Thomas Bauschert

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

46 Downloads (Pure)

Abstract

Neural networks (NNs) have been extensively adapted to various security tasks, such as spam detection, phishing, and intrusion detection. Particularly in IDS, NNs face significant vulnerabilities to adversarial attacks, where the adversary attempts to exploit the fragilities within machine-learning (ML) models. This study introduces a novel approach using interval-bound propagation (IBP) to formally verify and enhance the resilience of both shallow and deep NNs. We also investigated the effectiveness of various activation functions using benchmark IDS datasets. Our findings show that ReLu and Leaky-ReLu functions enhance resistance in shallow networks, whereas Tanh functions perform better in deep networks. We provide certified accuracies for models subjected to various input perturbations ranging from 0.0001 to 0.9, marking a significant advancement in verifying the security of NNs.
Original languageEnglish
Title of host publication2024 IEEE International Conference on Cyber Security and Resilience (CSR)
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages9-15
Number of pages6
ISBN (Electronic)9798350375367
ISBN (Print)9798350375374
DOIs
Publication statusPublished - 24 Sept 2024
Event2024 IEEE International Conference on Cyber Security and Resilience - Hilton London Tower Bridge, London, United Kingdom
Duration: 2 Sept 20244 Sept 2024
https://www.ieee-csr.org

Conference

Conference2024 IEEE International Conference on Cyber Security and Resilience
Abbreviated title2024 IEEE CSR
Country/TerritoryUnited Kingdom
CityLondon
Period2/09/244/09/24
Internet address

Keywords

  • Cybersecurity
  • Neural Network Security
  • Adversarial Robustness
  • Intrusion Detection System
  • Formal Verification
  • Robustness
  • Deep Learning

Fingerprint

Dive into the research topics of 'Verifying the robustness of machine learning based intrusion detection against adversarial perturbation'. Together they form a unique fingerprint.

Cite this