Models and Algorithms for Protecting Intrusion Detection Systems from Attacks on Machine Learning Components
( Pp. 17-25)

More about authors
Ichetovkin Egor А. postgraduate student, Laboratory of Computer Security Problems
St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS)
St. Petersburg, Russian Federation Kotenko Igor V. Dr. Sci. (Eng.), Professor, Honored Scientist of the Russian Federation; chief scientist and Head, Laboratory of Computer Security Problems; St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS); St. Petersburg, Russian Federation
Abstract:
Today, one of the means of protecting network infrastructure from cyberattacks is intrusion detection systems. Digitalization requires the use of tools that can cope not only with known types of attacks, but also with previously undescribed ones. Machine learning can be used to protect against such threats. The paper presents models and algorithms for protecting against evasion attacks on machine learning components of intrusion detection systems. The novelty is that for the first time, a simulation of the use of a protection subsystem based on long-short-term memory autoencoders during a fast gradient sign attack was carried out. The methodology consists in simulating adversarial attacks with an assessment of the effectiveness of protection using classical metrics: accuracy, recall, F-measure. The results of the study showed the effectiveness of the proposed subsystem for protecting machine learning components of intrusion detection systems from evasion attacks. The detection indicators were restored almost to their original values.
How to Cite:
Ichetovkin E.А., Kotenko I.V. Models and Algorithms for Protecting Intrusion Detection Systems from Attacks on Machine Learning Components. Computational Nanotechnology. 2025. Vol. 12. No. 1. Pp. 17–25. (In Rus.). DOI: 10.33693/2313-223X-2025-12-1-17-25. EDN: LSJCNO
Reference list:
Aggarwal R., Verma J., Siwach M. Small files’ problem in Hadoop: A systematic literature review. Journal of King Saud University “Computer and Information Sciences”. 2022. No. 34 (10). Part A. Pp. 8658–8674. DOI: 10.1016/j.jksuci.2021.09.007.
Harby A.A., Zulkernine F. From data warehouse to lakehouse: A comparative review. In: IEEE International Conference on Big Data (Big Data). Osaka, 2022. Pp. 389–395. DOI: 10.1109/BigData55660.2022.10020719.
Jain E.P., Gupta E.A. Hadoop architecture and its issues. International Journal of Engineering Research and General Science. 2017. No. 5 (2). Pp. 211–217. DOI: 10.1109/CSCI.2014.140.
Niazi S., Ismail M., Haridi S. et al. HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases. In: 15th USENIX Conference on File and Storage Technologies (FAST 17). USENIX Association, 2017. Pp. 89–104. DOI: 10.48550/arXiv.1606.01588.
Sharma G., Tripathi V., Srivastava A. Recent trends in Big Data ingestion tools: A study. In: Research in Intelligent and Computing in Engineering, Springer, 2021. Pp. 873–881. DOI: 10.1007/978-981-15-7527-3_83.
Shvachko K. HDFS scalability: The limits to growth. Login Usenix Mag. 2010. No. 35. Pp. 6–16.
White T. Hadoop: The definitive guide. 4 ed. O’Reilly Media, Inc., 2015. 754 p.
Madry A., Makelov A., Schmidt L. et al. Towards deep learning models resistant to adversarial attacks. In: Proceedings of the International Conference on Learning Representations (ICLR), 2018. DOI: 10.48550/arXiv.1706.06083.
Alahmed S., Alasad Q., Hammood M.M. et al. Mitigation of black-box attacks on intrusion detection systems-based ML. Computers. 2022. Vol. 11. No. 7. P. 115. DOI: 10.3390/computers11070115.
Rosenberg I., Shabtai A., Elovici Y., Rokach L. Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Computing Surveys. 2021. Vol. 54. No. 5. Pp. 1 36. DOI: 10.1145/3453158.
Ravi V., Chaganti R., Alazab M. Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system. Computers and Electrical Engineering. 2022. Vol. 102. P. 108156. DOI: 10.1016/j.compeleceng.2022.108156.
Nazir A. et al. A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem. Ain Shams Engineering Journal. 2024. P. 102777. DOI: 10.1016/j.asej.2024.102777.
Debicha I., Debatty T., Dricot J.-M., Mees W. Adversarial training for deep learning-based intrusion detection systems. arXiv preprint arXiv:2104.09852. 2021. DOI: 10.48550/arXiv.2104.09852.
Mohammadian H., Ghorbani A.A., Lashkari A.H. A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems. Applied Soft Computing. 2023. Vol. 137. P. 110173. DOI: 10.1016/j.asoc.2023.110173.
Panigrahi R., Borah S. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. Interna-tional Journal of Engineering Technology. 2018. Vol. 7. No. 3.24. Pp. 479 482.
Kurniabudi D.S., Darmawijoyo M.Y., Bin I. et al. CICIDS-2017 Dataset feature analysis with information gain for anomaly detection. IEEE Access. 2020. Vol. 8. Pp. 132911 132921. DOI: 10.1109/ACCESS.2020.3009843.
Verkerken M., D hooge L., Sudyana D. et al. Novel multi-stage approach for hierarchical intrusion detection. IEEE Transactions on Network and Service Management. 2023. No. 99. Pp. 1 1.
Goryunov M., Matskevich A., Rybolovlev D. Synthesis of a machine learning model for detecting computer attacks based on the CICIDS2017 dataset. Proc. ISP RAS. 2020. Vol. 32. Issue 5. Pp. 81 94. (In Rus.)
Belarbi O., Khan A., Carnelli P., Spyridopoulos T. An intrusion detection system based on deep belief networks. In: 4th International Conference on Science of Cyber Security (SciSec 2022). Springer International Publishing, Cham, 2022. Pp. 377 392.
Ayub M.A., Johnson W.A., Talbert D.A., Siraj A. Model evasion attack on intrusion detection systems using adversarial machine learning. In: 54th Annual Conference on Information Sciences and Systems (CISS), 2020. Pp. 1 6. DOI: 10.1109/CISS48834.2020.1570617295.
Primartha R., Tama B.A. Anomaly detection using random forest: A performance revisited. In: Proceedings of International Conference on Data and Software Engineering (ICoDSE), Palembang, Indonesia, November 1 2, 2017. Pp. 1 6.
Kalaivaani P.T., Krishnamoorthy R., Reddy A.S., Chelladurai A.D.D. Adaptive multimode decision tree classification model using effective system analysis in IDS for 5G and IoT security issues. In: Secure Communication for 5G and IoT Networks. Springer, 2022. Pp. 141 158.
Goodfellow I.J., Shlens J., Szegedy C. Explaining and harnessing adversarial examples. In: Proceedings of the International Conference on Learning Representations (ICLR), 2015. DOI: 10.48550/arXiv.1412.6572.
Jmila H., Khedher M.I. Adversarial machine learning for network intrusion detection: A comparative study. Computer Networks. 2022. Vol. 214. P. 109073. DOI: 10.1016/j.comnet.2022.109073.
Szegedy C. et al. Intriguing properties of neural networks. In: Proceedings of the International Conference on Lear ning Representations (ICLR), 2014. DOI: 10.48550/arXiv.1312.6199.
Sheatsley R. et al. Adversarial examples for network intrusion detection systems. Journal of Computer Security. 2022. Vol. 30. No. 5. Pp. 727 752. DOI: 10.3233/JCS-210034.
Laghrissi F.E., Douzi S., Douzi K., Hssina B. Intrusion detection systems using Long Short-Term Memory (LSTM). Journal of Big Data. 2021. Vol. 8. No. 1. P. 65. DOI: 10.1186/s40537-021-00453-7.
Papernot N. et al. The limitations of deep learning in adver sarial settings. In: IEEE European Symposium on Security and Privacy (EuroS P), 2016. Pp. 372 387. DOI: 10.1109/EuroSP.2016.36.
Carlini N., Athalye A., Papernot N. et al. On evaluating adversarial robustness. arXiv preprint arXiv:1902.06705. 2019. DOI: 10.48550/arXiv.1902.06705.
Ibitoye O., Abou-Khamis R., El Shehaby M. et al. The threat of adversarial attacks on machine learning in network Security A Survey. arXiv preprint arXiv:1911.02621. 2019. DOI: 10.48550/arXiv.1911.02621.
Keywords:
cybersecurity, intrusion detection systems, machine learning components, adversarial attacks, defence techniques.


Related Articles

History and Theory of Politics Pages: 15-23 DOI: 10.33693/2223-0092-2024-14-5-15-23 Issue №152162
Some United States of America Approaches to Cyber Deterrence
cybernetic space information space security of cybernetic space cybersecurity cyberattack
Show more
Public Law Pages: 16-20 DOI: 10.33693/2782-7372-2023-2-2-16-20 Issue №23134
Integrated Approach of Personnel Training for Cybersecurity: Challenges and Problems
digital economy information law intellectual property information security information warfare
Show more
Pages: 16-20 DOI: 10.33693/2782-7372-2023-2-2-16-20 Issue №
Integrated Approach of Personnel Training for Cybersecurity: Challenges and Problems
digital economy information law intellectual property information security information warfare
Show more
PUBLIC LAW (STATE LAW) Pages: 20-29 Issue №21610
The Maturity of the Legal and Regulatory Framework in the Field of Cybersecurity in Latin America according to the Capability Maturity Model
legal maturity cybersecurity capability maturity model for states CMM model cybersecurity cyber attacks
Show more
Political Institutions, Processes and Technologies Pages: 49-54 DOI: 10.33693/2223-0092-2025-15-2-49-54 Issue №195081
Dynamics of Information Support for National and Military Security of Turkey at the Present Stage
Turkey national security military security information security foreign policy
Show more
PUBLIC LAW (STATE LAW) SCIENCES Pages: 39-55 DOI: 10.33693/2541-8025-2025-21-2-39-55 Issue №195002
Cybersecurity Problems in the Modern World: Regularities and Prospects
Cybersecurity Cybersecurity Indicators Global Cybersecurity Index (GSI) Nation Models of Cybersecurity Human Development Index (HDI).
Show more
1. NATIONAL ECONOMY AND MANAGEMENT 08.00.05 Pages: 41-45 Issue №19821
Prospects for the Development of Industry 4.0 in the Context of Digitalization of the Russian Economy
digital economy Industry 4.0 cybersecurity digital technologies data protection
Show more
2. PUBLIC LAW (STATE LAW) (5.1.2.) Pages: 48-54 Issue №22137
On Proposals for Improving the Legal Support of Information Security of the Russian Federation in the Context of Sanctions and Threats from Unfriendly States
information security information and telecommunication infrastructure national security cybersecurity legal support
Show more
Cyberspace Pages: 70-81 DOI: 10.33693/2223-0092-2021-11-4-70-81 Issue №19520
Cybersecurity and its Legal Regulation (Foreign and Russian Experience)
cybersecurity information security international security cyberspace virtual space
Show more
PRIVATE LAW (CIVIL) Pages: 95-99 Issue №22019
About Strategic Directions of Information Security Protection and Further Development of the IT Sector
information security information and telecommunication infrastructure national security cybersecurity legal support
Show more