首页> 外文期刊>Data in Brief >DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems
【24h】

DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems

机译:DRELAB - 深度加强学习对抗僵尸网络:用于对僵尸网络入侵检测系统进行对抗性攻击的基准数据集

获取原文
           

摘要

We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet detectors against adversarial attacks. This dataset includes realistic adversarial samples that are generated by leveraging two widely used Deep Reinforcement Learning (DRL) techniques. These adversarial samples are proved to evade state of the art detectors based on Machine- and Deep-Learning algorithms. The initial corpus of malicious samples consists of network flows belonging to different botnet families presented in three public datasets containing real enterprise network traffic. We use these datasets to devise detectors capable of achieving state-of-the-art performance. We then train two DRL agents, based onDouble Deep Q-NetworkandDeep Sarsa, to generate realistic adversarial samples: the goal is achieving misclassifications by performing small modifications to the initial malicious samples. These alterations involve the features that can be more realistically altered by an expert attacker, and do not compromise the underlying malicious logic of the original samples. Our dataset represents an important contribution to the cybersecurity research community as it is the first including thousands of automatically generated adversarial samples that are able to thwart state of the art classifiers with a high evasion rate. The adversarial samples are grouped by malware variant and provided in a CSV file format. Researchers can validate their defensive proposals by testing their detectors against the adversarial samples of the proposed dataset. Moreover, the analysis of these samples can pave the way to a deeper comprehension of adversarial attacks and to some sort of explainability of machine learning defensive algorithms. They can also support the definition of novel effective defensive techniques.
机译:我们展示了旨在作为基准测试的第一个数据集,以验证僵尸网络探测器对抗对抗攻击的影响。该数据集包括通过利用两个广泛使用的深增强学习(DRL)技术而产生的现实对抗性样本。这些对手样本被证明基于机器和深度学习算法逃避现有技术的探测器。恶意样本的初始语料库包括属于包含真实企业网络流量的三个公共数据集中的不同僵尸网络系列的网络流。我们使用这些数据集来设计能够实现最先进性能的探测器。然后,我们将三个DRL代理,基于双层Q-NetWorkandDeep Sarsa,以产生现实的对抗性样本:目标是通过对初始恶意样本进行小修改来实现错误分类。这些更改涉及专业攻击者可以更现实地改变的功能,并不会损害原始样本的潜在恶意逻辑。我们的数据集代表了对网络安全研究界的重要贡献,因为它是第一个包括成千上万的自动生成的对抗性样本,其能够以高逃逸率突破艺术分类器的状态。对手样本由恶意软件变体分组,并以CSV文件格式提供。研究人员可以通过对拟议数据集的对抗样本测试其探测器来验证他们的防御性建议。此外,这些样品的分析可以铺平道路对对抗性攻击的更深理解和对机器学习防御算法的某种解释性。他们还可以支持新颖的有效防御技术的定义。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号