Classification of Adversarial Attacks Using Ensemble Clustering Approach
作者机构:Center of Excellence in AI&Emerging TechnologiesSchool of ITMae Fah Luang UniversityChiang RaiThailand Department of Computer ScienceAberystwyth UniversityAberystwythUnited Kingdom School of Informatics and Digital EngineeringAston UniversityBirminghamUnited Kingdom Department of Computer and Information SciencesNorthumbria UniversityNewcastleUnited Kingdom
出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))
年 卷 期:2023年第74卷第2期
页 面:2479-2498页
核心收录:
学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 081104[工学-模式识别与智能系统] 08[工学] 080203[工学-机械设计及理论] 0835[工学-软件工程] 0802[工学-机械工程] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)]
基 金:British Council National Research Council of Thailand, NRCT
主 题:Intrusion detection adversarial attack machine learning feature transformation ensemble clustering
摘 要:As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of *** safeguard these,a perimeter defence likeNIDS(network-based intrusion detection system)can be effective for known *** has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks,where obfuscation techniques are applied to disguise patterns of intrusive *** current research focuses on non-payload connections at the TCP(transmission control protocol)stack level that is applicable to different network *** contrary to the wrapper method introduced with the benchmark dataset,three new filter models are proposed to transform the feature space without knowledge of class *** ECT(ensemble clustering based transformation)techniques,i.e.,ECT-Subspace,ECT-Noise and ECT-Combined,are developed using the concept of ensemble clustering and three different ensemble generation strategies,i.e.,random feature subspace,feature noise injection and their *** on the empirical study with published dataset and four classification algorithms,new models usually outperform that original wrapper and other filter alternatives found in the *** is similarly summarized from the first experiment with basic classification of legitimate and direct attacks,and the second that focuses on recognizing obfuscated *** addition,analysis of algorithmic parameters,i.e.,ensemble size and level of noise,is provided as a guideline for a practical use.