Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN

Samer Y. Khamaiseh, I. Alsmadi, Abdullah Al-Alaj
{"title":"Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN","authors":"Samer Y. Khamaiseh, I. Alsmadi, Abdullah Al-Alaj","doi":"10.1109/NFV-SDN50289.2020.9289908","DOIUrl":null,"url":null,"abstract":"Recently, different machine learning-based detection systems are proposed to detect DDoS saturation attacks in Software-defined Networking (SDN). Meanwhile, different research studies highlight the vulnerabilities of adapting such systems in SDN. For instance, an adversary can fool the machine learning classifiers of these systems by crafting specific adversarial attack samples, preventing the detection of DoS saturation attacks. To better understand the security properties of these classifiers in adversarial settings, this paper investigates the robustness of the supervised and unsupervised machine learning classifiers against adversarial attacks. First, we propose an adversarial testing tool that can generate adversarial attacks that avoid the detection of four saturation attacks (i.e., SYN, UDP, ICMP, and TCP-SARFU), by perturbing different traffic features. Second, we propose a machine learning-based saturation attack detection system that utilizes different supervised and unsupervised machine learning classifiers as a testing platform. The experimental results demonstrate that the generated adversarial attacks can reduce the detection performance of the proposed detection system dramatically. Specifically, the detection performance of the four saturation attacks was decreased by more than 90% across several machine learning classifiers. This indicates that the proposed adversarial testing tool can effectively compromise the machine learning-based saturation attack detection systems.","PeriodicalId":283280,"journal":{"name":"2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NFV-SDN50289.2020.9289908","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Recently, different machine learning-based detection systems are proposed to detect DDoS saturation attacks in Software-defined Networking (SDN). Meanwhile, different research studies highlight the vulnerabilities of adapting such systems in SDN. For instance, an adversary can fool the machine learning classifiers of these systems by crafting specific adversarial attack samples, preventing the detection of DoS saturation attacks. To better understand the security properties of these classifiers in adversarial settings, this paper investigates the robustness of the supervised and unsupervised machine learning classifiers against adversarial attacks. First, we propose an adversarial testing tool that can generate adversarial attacks that avoid the detection of four saturation attacks (i.e., SYN, UDP, ICMP, and TCP-SARFU), by perturbing different traffic features. Second, we propose a machine learning-based saturation attack detection system that utilizes different supervised and unsupervised machine learning classifiers as a testing platform. The experimental results demonstrate that the generated adversarial attacks can reduce the detection performance of the proposed detection system dramatically. Specifically, the detection performance of the four saturation attacks was decreased by more than 90% across several machine learning classifiers. This indicates that the proposed adversarial testing tool can effectively compromise the machine learning-based saturation attack detection systems.
SDN中基于机器学习的欺骗性饱和攻击检测系统
近年来,针对软件定义网络(SDN)中的DDoS饱和攻击,提出了不同的基于机器学习的检测系统。同时,不同的研究都强调了在SDN中采用此类系统的脆弱性。例如,攻击者可以通过制作特定的对抗性攻击样本来欺骗这些系统的机器学习分类器,从而阻止DoS饱和攻击的检测。为了更好地理解这些分类器在对抗性设置中的安全属性,本文研究了监督和无监督机器学习分类器对对抗性攻击的鲁棒性。首先,我们提出了一种对抗性测试工具,该工具可以通过干扰不同的流量特征来产生对抗性攻击,从而避免检测四种饱和攻击(即SYN, UDP, ICMP和TCP-SARFU)。其次,我们提出了一个基于机器学习的饱和攻击检测系统,该系统利用不同的监督和无监督机器学习分类器作为测试平台。实验结果表明,生成的对抗性攻击会显著降低检测系统的检测性能。具体来说,在几个机器学习分类器中,四种饱和攻击的检测性能下降了90%以上。这表明所提出的对抗性测试工具可以有效地破坏基于机器学习的饱和攻击检测系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信