James Msughter Adeke , Guangjie Liu , Lord Amoah , Ogonna Joshua Nwali
{"title":"Investigating the impact of feature selection on adversarial transferability in intrusion detection system","authors":"James Msughter Adeke , Guangjie Liu , Lord Amoah , Ogonna Joshua Nwali","doi":"10.1016/j.cose.2025.104327","DOIUrl":null,"url":null,"abstract":"<div><div>Adversarial attacks pose a serious threat to cybersecurity systems, particularly intrusion detection systems (IDSs). The property of transferability exacerbates this threat, as attacks designed to fool one IDS model can often fool others in black-box settings. Despite significant efforts to mitigate this property, the impact of feature selection on attack transferability remains unknown. This study investigates adversarial transferability across various machine learning (ML) and deep learning (DL) models used in IDSs. Two transferability scenarios are investigated: inter-model and intra-model transferability. We trained multiple IDS models, including support vector machine (SVM), random forest (RF), decision tree (DT), logistic regression (LR), and deep neural networks (DNNs) with different architectures, on feature subsets from various techniques. These IDS models are then subjected to a black-box attack using the zeroth-order optimization (ZOO) method. With the IoT-23 and UNSW-NB15 datasets, we evaluated transferability across different IDS models and feature subsets. The results show significant variations in transferability, with certain feature subsets notably reducing the attack success rate (ASR). Specifically, we recorded a reduction in ASR ranging from 99.9% to 0% depending on the feature subset and the target IDS model. These findings highlight the impact of feature selection on disrupting attack transferability, and suggest that IDS models trained with appropriate feature subsets are more robust to adversarial transferability.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"151 ","pages":"Article 104327"},"PeriodicalIF":4.8000,"publicationDate":"2025-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825000161","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Adversarial attacks pose a serious threat to cybersecurity systems, particularly intrusion detection systems (IDSs). The property of transferability exacerbates this threat, as attacks designed to fool one IDS model can often fool others in black-box settings. Despite significant efforts to mitigate this property, the impact of feature selection on attack transferability remains unknown. This study investigates adversarial transferability across various machine learning (ML) and deep learning (DL) models used in IDSs. Two transferability scenarios are investigated: inter-model and intra-model transferability. We trained multiple IDS models, including support vector machine (SVM), random forest (RF), decision tree (DT), logistic regression (LR), and deep neural networks (DNNs) with different architectures, on feature subsets from various techniques. These IDS models are then subjected to a black-box attack using the zeroth-order optimization (ZOO) method. With the IoT-23 and UNSW-NB15 datasets, we evaluated transferability across different IDS models and feature subsets. The results show significant variations in transferability, with certain feature subsets notably reducing the attack success rate (ASR). Specifically, we recorded a reduction in ASR ranging from 99.9% to 0% depending on the feature subset and the target IDS model. These findings highlight the impact of feature selection on disrupting attack transferability, and suggest that IDS models trained with appropriate feature subsets are more robust to adversarial transferability.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.