Papers
Topics
Authors
Recent
Search
2000 character limit reached

Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems

Published 29 Sep 2023 in cs.CR | (2310.00070v1)

Abstract: Botnet detection based on machine learning have witnessed significant leaps in recent years, with the availability of large and reliable datasets that are extracted from real-life scenarios. Consequently, adversarial attacks on machine learning-based cybersecurity systems are posing a significant threat to the practicality of these solutions. In this paper, we introduce a novel attack that utilizes machine learning model's explainability in evading detection by botnet detection systems. The proposed attack utilizes information obtained from model's explainability to build adversarial samples that can evade detection in a blackbox setting. The proposed attack was tested on a trained IoT botnet detection systems and was capable of bypassing the botnet detection with 0% detection by altering one feature only to generate the adversarial samples.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (20)
  1. “Artificial Intelligence market size/revenue comparisons 2022 |||| Statista,” Mar. 2023. [Online; accessed 23. Mar. 2023], https://www.statista.com/statistics/941835/artificial-intelligence-market-size-revenue-comparisons.
  2. M. M. Alani, “Big data in cybersecurity: a survey of applications and future trends,” Journal of Reliable Intelligent Environments, vol. 7, no. 2, pp. 85–114, 2021.
  3. I. H. Sarker, A. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, “Cybersecurity data science: an overview from machine learning perspective,” Journal of Big data, vol. 7, pp. 1–29, 2020.
  4. M. M. Alani, “Botstop: Packet-based efficient and explainable iot botnet detection using machine learning,” Computer Communications, vol. 193, pp. 53–62, 2022.
  5. Y. Xing, H. Shu, H. Zhao, D. Li, and L. Guo, “Survey on botnet detection techniques: Classification, methods, and evaluation,” Mathematical Problems in Engineering, vol. 2021, pp. 1–24, 2021.
  6. S. Gaonkar, N. F. Dessai, J. Costa, A. Borkar, S. Aswale, and P. Shetgaonkar, “A survey on botnet detection techniques,” in 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), pp. 1–6, IEEE, 2020.
  7. M. M. Alani, “On recent security issues in machine learning,” in 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–6, IEEE, 2020.
  8. E. Alhajjar, P. Maxwell, and N. Bastian, “Adversarial machine learning in network intrusion detection systems,” Expert Systems with Applications, vol. 186, p. 115782, 2021.
  9. Z. Zhang, H. A. Hamadi, E. Damiani, C. Y. Yeun, and F. Taher, “Explainable artificial intelligence applications in cyber security: State-of-the-art in research,” IEEE Access, vol. 10, pp. 93104–93139, 2022.
  10. Z. Lin, Y. Shi, and Z. Xue, “Idsgan: Generative adversarial networks for attack generation against intrusion detection,” in Advances in Knowledge Discovery and Data Mining: 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, May 16–19, 2022, Proceedings, Part III, pp. 79–91, Springer, 2022.
  11. M. A. Ayub, W. A. Johnson, D. A. Talbert, and A. Siraj, “Model evasion attack on intrusion detection systems using adversarial machine learning,” in 2020 54th annual conference on information sciences and systems (CISS), pp. 1–6, IEEE, 2020.
  12. R. Sheatsley, N. Papernot, M. J. Weisman, G. Verma, and P. McDaniel, “Adversarial examples for network intrusion detection systems,” Journal of Computer Security, vol. 2022, no. Preprint, pp. 1–26, 2022.
  13. H. Mohammadian, A. A. Ghorbani, and A. H. Lashkari, “A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems,” Applied Soft Computing, p. 110173, 2023.
  14. I. Debicha, B. Cochez, T. Kenaza, T. Debatty, J.-M. Dricot, and W. Mees, “Adv-bot: Realistic adversarial botnet attacks against network intrusion detection systems,” Computers & Security, vol. 129, p. 103176, 2023.
  15. C. Zhang, X. Costa-Pérez, and P. Patras, “Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms,” IEEE/ACM Transactions on Networking, vol. 30, no. 3, pp. 1294–1311, 2022.
  16. C. Molnar, Interpretable machine learning. Lulu. com, 2020.
  17. S. M. Lundberg and S.-I. Lee, “A unified approach to interpreting model predictions,” Advances in neural information processing systems, vol. 30, 2017.
  18. Crc Press, 2016.
  19. H. Kang, D. H. Ahn, G. M. Lee, J. D. Yoo, K. H. Park, and H. K. Kim, “Iot network intrusion dataset,” 2019.
  20. R. Wiyatno and A. Xu, “Maximal jacobian-based saliency map attack,” arXiv preprint arXiv:1808.07945, 2018.
Citations (1)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.