The Evaluation of Adversarial Attacks Against ML-powered NIDS in a Realistic Scenario [preprint]
Description
Machine learning-based Network Intrusion Detection Systems have significantly advanced network security by identifying and mitigating sophisticated threats. However, current research on adversarial attacks focuses on pre-aggregated datasets rather than raw traffic, which impacts the realism of the scenario. This paper evaluates a more realistic adversarial attack scenario by manipulating raw traffic in the PCAP files before the aggregation step of NetFlow data. This method better simulates real-world conditions, where traffic is captured and processed dynamically. We implement and compare traditional adversarial attacks using the Fast Gradient Sign Method directly on NetFlow data with the realistic scenario of infecting raw PCAP traffic. The main goal is to demonstrate whether such adversarial attacks would maintain the same effectiveness when performed on real traffic. Experimental results demonstrate that the realistic approach maintains the integrity and functionality of network traffic, and manages to affect the NIDS performance.
---
Disclaimer:
This is a preprint version of the article.
The content here is for view-only purposes. This is not the final published version and may differ from the version of record.
Please refer to the official version for citation and authoritative use.
Files
ZENODO__The_Evaluation_of_Adversarial_Attacks_Against_ML_powered_NIDS_in_a_Realistic_Scenario.pdf
Files
(109.9 kB)
Name | Size | Download all |
---|---|---|
md5:fcfc595bc4cda8c84a90b14fc36baac7
|
109.9 kB | Preview Download |