Zhichao Hu , Dewen Kong , Junzhong Miao , Qing Guo , Gang Du , Likun Liu , Lina Ma , Xiangzhan Yu
{"title":"TND:入侵检测系统对抗攻击的两阶段非侵入性防御","authors":"Zhichao Hu , Dewen Kong , Junzhong Miao , Qing Guo , Gang Du , Likun Liu , Lina Ma , Xiangzhan Yu","doi":"10.1016/j.comnet.2025.111287","DOIUrl":null,"url":null,"abstract":"<div><div>Deep learning methods have demonstrated notable success in intrusion detection systems (IDS). However, these models exhibit inherent vulnerabilities to adversarial attacks, where minimal perturbations can cause misclassification. Current IDS implementations often lack built-in protections against such threats, creating exploitable security gaps. While existing defense approaches typically employ adversarial training or data purification to enhance robustness, they face critical limitations in online IDS scenarios: adversarial training requires computationally expensive model retraining that may degrade performance, while comprehensive data purification imposes significant resource overhead and risks misclassifying legitimate samples. To address these challenges, we propose <em>TND</em>—a novel two-stage non-invasive defense framework. <em>TND</em> first efficiently filters adversarial examples using Locality-Sensitive Hashing (LSH), then applies a contrastive learning-optimized denoising autoencoder for precise data purification. Experimental results show <em>TND</em> achieves 0.873 adversarial detection accuracy (comparable to MANDA’s 0.875) while reducing training time to just 3% of MANDA’s requirements. This yields superior operational efficiency, enabling 7% and 5% improvements in IDS classification rates on CICIDS2017 and NSL-KDD datasets respectively—without modifying the underlying IDS model. By combining low computational overhead with non-intrusive deployment, <em>TND</em> establishes a practical, scalable solution for real-world adversarial defense in IDS environments.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"265 ","pages":"Article 111287"},"PeriodicalIF":4.4000,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TND: Two-stage non-invasive defense of intrusion detection system from adversarial attack\",\"authors\":\"Zhichao Hu , Dewen Kong , Junzhong Miao , Qing Guo , Gang Du , Likun Liu , Lina Ma , Xiangzhan Yu\",\"doi\":\"10.1016/j.comnet.2025.111287\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Deep learning methods have demonstrated notable success in intrusion detection systems (IDS). However, these models exhibit inherent vulnerabilities to adversarial attacks, where minimal perturbations can cause misclassification. Current IDS implementations often lack built-in protections against such threats, creating exploitable security gaps. While existing defense approaches typically employ adversarial training or data purification to enhance robustness, they face critical limitations in online IDS scenarios: adversarial training requires computationally expensive model retraining that may degrade performance, while comprehensive data purification imposes significant resource overhead and risks misclassifying legitimate samples. To address these challenges, we propose <em>TND</em>—a novel two-stage non-invasive defense framework. <em>TND</em> first efficiently filters adversarial examples using Locality-Sensitive Hashing (LSH), then applies a contrastive learning-optimized denoising autoencoder for precise data purification. Experimental results show <em>TND</em> achieves 0.873 adversarial detection accuracy (comparable to MANDA’s 0.875) while reducing training time to just 3% of MANDA’s requirements. This yields superior operational efficiency, enabling 7% and 5% improvements in IDS classification rates on CICIDS2017 and NSL-KDD datasets respectively—without modifying the underlying IDS model. By combining low computational overhead with non-intrusive deployment, <em>TND</em> establishes a practical, scalable solution for real-world adversarial defense in IDS environments.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"265 \",\"pages\":\"Article 111287\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-04-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625002555\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625002555","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
TND: Two-stage non-invasive defense of intrusion detection system from adversarial attack
Deep learning methods have demonstrated notable success in intrusion detection systems (IDS). However, these models exhibit inherent vulnerabilities to adversarial attacks, where minimal perturbations can cause misclassification. Current IDS implementations often lack built-in protections against such threats, creating exploitable security gaps. While existing defense approaches typically employ adversarial training or data purification to enhance robustness, they face critical limitations in online IDS scenarios: adversarial training requires computationally expensive model retraining that may degrade performance, while comprehensive data purification imposes significant resource overhead and risks misclassifying legitimate samples. To address these challenges, we propose TND—a novel two-stage non-invasive defense framework. TND first efficiently filters adversarial examples using Locality-Sensitive Hashing (LSH), then applies a contrastive learning-optimized denoising autoencoder for precise data purification. Experimental results show TND achieves 0.873 adversarial detection accuracy (comparable to MANDA’s 0.875) while reducing training time to just 3% of MANDA’s requirements. This yields superior operational efficiency, enabling 7% and 5% improvements in IDS classification rates on CICIDS2017 and NSL-KDD datasets respectively—without modifying the underlying IDS model. By combining low computational overhead with non-intrusive deployment, TND establishes a practical, scalable solution for real-world adversarial defense in IDS environments.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.