An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm

In today’s digital world, the information systems are revolutionizing the way we connect. As the people are trying to adopt and integrate intelligent systems into daily lives, the risks around cyberattacks on user-specific information have significantly grown. To ensure safe communication, the Intru...

Full description

Bibliographic Details
Main Authors: Ayyaz Ul Haq Qureshi, Hadi Larijani, Mehdi Yousefi, Ahsan Adeel, Nhamoinesu Mtetwa
Format: Article
Language:English
Published: MDPI AG 2020-07-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/9/3/58
_version_ 1797561858773745664
author Ayyaz Ul Haq Qureshi
Hadi Larijani
Mehdi Yousefi
Ahsan Adeel
Nhamoinesu Mtetwa
author_facet Ayyaz Ul Haq Qureshi
Hadi Larijani
Mehdi Yousefi
Ahsan Adeel
Nhamoinesu Mtetwa
author_sort Ayyaz Ul Haq Qureshi
collection DOAJ
description In today’s digital world, the information systems are revolutionizing the way we connect. As the people are trying to adopt and integrate intelligent systems into daily lives, the risks around cyberattacks on user-specific information have significantly grown. To ensure safe communication, the Intrusion Detection Systems (IDS) were developed often by using machine learning (ML) algorithms that have the unique ability to detect malware against network security violations. Recently, it was reported that the IDS are prone to carefully crafted perturbations known as adversaries. With the aim to understand the impact of such attacks, in this paper, we have proposed a novel random neural network-based adversarial intrusion detection system (RNN-ADV). The NSL-KDD dataset is utilized for training. For adversarial attack crafting, the Jacobian Saliency Map Attack (JSMA) algorithm is used, which identifies the feature which can cause maximum change to the benign samples with minimum added perturbation. To check the effectiveness of the proposed adversarial scheme, the results are compared with a deep neural network which indicates that RNN-ADV performs better in terms of accuracy, precision, recall, F1 score and training epochs.
first_indexed 2024-03-10T18:20:33Z
format Article
id doaj.art-210d74c65db148bc9c65b3c50d21dfa0
institution Directory Open Access Journal
issn 2073-431X
language English
last_indexed 2024-03-10T18:20:33Z
publishDate 2020-07-01
publisher MDPI AG
record_format Article
series Computers
spelling doaj.art-210d74c65db148bc9c65b3c50d21dfa02023-11-20T07:18:46ZengMDPI AGComputers2073-431X2020-07-01935810.3390/computers9030058An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) AlgorithmAyyaz Ul Haq Qureshi0Hadi Larijani1Mehdi Yousefi2Ahsan Adeel3Nhamoinesu Mtetwa4School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow G4 0BA, UKSchool of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow G4 0BA, UKSchool of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow G4 0BA, UKdeepCI.org, Edinburgh EH16 5XW, UKBarclays Bank Plc., Glasgow G2 7JT, UKIn today’s digital world, the information systems are revolutionizing the way we connect. As the people are trying to adopt and integrate intelligent systems into daily lives, the risks around cyberattacks on user-specific information have significantly grown. To ensure safe communication, the Intrusion Detection Systems (IDS) were developed often by using machine learning (ML) algorithms that have the unique ability to detect malware against network security violations. Recently, it was reported that the IDS are prone to carefully crafted perturbations known as adversaries. With the aim to understand the impact of such attacks, in this paper, we have proposed a novel random neural network-based adversarial intrusion detection system (RNN-ADV). The NSL-KDD dataset is utilized for training. For adversarial attack crafting, the Jacobian Saliency Map Attack (JSMA) algorithm is used, which identifies the feature which can cause maximum change to the benign samples with minimum added perturbation. To check the effectiveness of the proposed adversarial scheme, the results are compared with a deep neural network which indicates that RNN-ADV performs better in terms of accuracy, precision, recall, F1 score and training epochs.https://www.mdpi.com/2073-431X/9/3/58intrusion detectionadversarial attacksJSMANSL-KDDnetwork security
spellingShingle Ayyaz Ul Haq Qureshi
Hadi Larijani
Mehdi Yousefi
Ahsan Adeel
Nhamoinesu Mtetwa
An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm
Computers
intrusion detection
adversarial attacks
JSMA
NSL-KDD
network security
title An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm
title_full An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm
title_fullStr An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm
title_full_unstemmed An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm
title_short An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm
title_sort adversarial approach for intrusion detection systems using jacobian saliency map attacks jsma algorithm
topic intrusion detection
adversarial attacks
JSMA
NSL-KDD
network security
url https://www.mdpi.com/2073-431X/9/3/58
work_keys_str_mv AT ayyazulhaqqureshi anadversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT hadilarijani anadversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT mehdiyousefi anadversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT ahsanadeel anadversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT nhamoinesumtetwa anadversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT ayyazulhaqqureshi adversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT hadilarijani adversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT mehdiyousefi adversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT ahsanadeel adversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm
AT nhamoinesumtetwa adversarialapproachforintrusiondetectionsystemsusingjacobiansaliencymapattacksjsmaalgorithm