Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems (2310.00070v1)
Abstract: Botnet detection based on machine learning have witnessed significant leaps in recent years, with the availability of large and reliable datasets that are extracted from real-life scenarios. Consequently, adversarial attacks on machine learning-based cybersecurity systems are posing a significant threat to the practicality of these solutions. In this paper, we introduce a novel attack that utilizes machine learning model's explainability in evading detection by botnet detection systems. The proposed attack utilizes information obtained from model's explainability to build adversarial samples that can evade detection in a blackbox setting. The proposed attack was tested on a trained IoT botnet detection systems and was capable of bypassing the botnet detection with 0% detection by altering one feature only to generate the adversarial samples.
- “Artificial Intelligence market size/revenue comparisons 2022 |||| Statista,” Mar. 2023. [Online; accessed 23. Mar. 2023], https://www.statista.com/statistics/941835/artificial-intelligence-market-size-revenue-comparisons.
- M. M. Alani, “Big data in cybersecurity: a survey of applications and future trends,” Journal of Reliable Intelligent Environments, vol. 7, no. 2, pp. 85–114, 2021.
- I. H. Sarker, A. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, “Cybersecurity data science: an overview from machine learning perspective,” Journal of Big data, vol. 7, pp. 1–29, 2020.
- M. M. Alani, “Botstop: Packet-based efficient and explainable iot botnet detection using machine learning,” Computer Communications, vol. 193, pp. 53–62, 2022.
- Y. Xing, H. Shu, H. Zhao, D. Li, and L. Guo, “Survey on botnet detection techniques: Classification, methods, and evaluation,” Mathematical Problems in Engineering, vol. 2021, pp. 1–24, 2021.
- S. Gaonkar, N. F. Dessai, J. Costa, A. Borkar, S. Aswale, and P. Shetgaonkar, “A survey on botnet detection techniques,” in 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), pp. 1–6, IEEE, 2020.
- M. M. Alani, “On recent security issues in machine learning,” in 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–6, IEEE, 2020.
- E. Alhajjar, P. Maxwell, and N. Bastian, “Adversarial machine learning in network intrusion detection systems,” Expert Systems with Applications, vol. 186, p. 115782, 2021.
- Z. Zhang, H. A. Hamadi, E. Damiani, C. Y. Yeun, and F. Taher, “Explainable artificial intelligence applications in cyber security: State-of-the-art in research,” IEEE Access, vol. 10, pp. 93104–93139, 2022.
- Z. Lin, Y. Shi, and Z. Xue, “Idsgan: Generative adversarial networks for attack generation against intrusion detection,” in Advances in Knowledge Discovery and Data Mining: 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, May 16–19, 2022, Proceedings, Part III, pp. 79–91, Springer, 2022.
- M. A. Ayub, W. A. Johnson, D. A. Talbert, and A. Siraj, “Model evasion attack on intrusion detection systems using adversarial machine learning,” in 2020 54th annual conference on information sciences and systems (CISS), pp. 1–6, IEEE, 2020.
- R. Sheatsley, N. Papernot, M. J. Weisman, G. Verma, and P. McDaniel, “Adversarial examples for network intrusion detection systems,” Journal of Computer Security, vol. 2022, no. Preprint, pp. 1–26, 2022.
- H. Mohammadian, A. A. Ghorbani, and A. H. Lashkari, “A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems,” Applied Soft Computing, p. 110173, 2023.
- I. Debicha, B. Cochez, T. Kenaza, T. Debatty, J.-M. Dricot, and W. Mees, “Adv-bot: Realistic adversarial botnet attacks against network intrusion detection systems,” Computers & Security, vol. 129, p. 103176, 2023.
- C. Zhang, X. Costa-Pérez, and P. Patras, “Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms,” IEEE/ACM Transactions on Networking, vol. 30, no. 3, pp. 1294–1311, 2022.
- C. Molnar, Interpretable machine learning. Lulu. com, 2020.
- S. M. Lundberg and S.-I. Lee, “A unified approach to interpreting model predictions,” Advances in neural information processing systems, vol. 30, 2017.
- Crc Press, 2016.
- H. Kang, D. H. Ahn, G. M. Lee, J. D. Yoo, K. H. Park, and H. K. Kim, “Iot network intrusion dataset,” 2019.
- R. Wiyatno and A. Xu, “Maximal jacobian-based saliency map attack,” arXiv preprint arXiv:1808.07945, 2018.