2009
DOI: 10.1145/1639562.1639592
|View full text |Cite
|
Sign up to set email alerts
|

Stealthy poisoning attacks on PCA-based anomaly detectors

Abstract: We consider systems that use PCA-based detectors obtained from a comprehensive view of the network's traffic to identify anomalies in backbone networks. To assess these detectors' susceptibility to adversaries wishing to evade detection, we present and evaluate short-term and long-term data poisoning schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boiling Frog attacks significantly reduce chaff volume, while only moderately increasing poisoning durat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0
2

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 5 publications
(8 reference statements)
0
19
0
2
Order By: Relevance
“…Normally there are 3 methods that can be applied to assess the performance of network anomaly detection algorithm: network traffic simulation experiment [10,[14][15][16], testbed experiment [19], and real network data analysis [9,10,20,32,34]. There are pros and cons regarding each method.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Normally there are 3 methods that can be applied to assess the performance of network anomaly detection algorithm: network traffic simulation experiment [10,[14][15][16], testbed experiment [19], and real network data analysis [9,10,20,32,34]. There are pros and cons regarding each method.…”
Section: Discussionmentioning
confidence: 99%
“…References [14,15] took further steps to study poisoning attacks on anomaly detectors and evaluated poisoning techniques and developed defense. The authors of [16] listed 3 mechanisms of poisoning attacks and proposed defense based on robust PCA with projection pursuit.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Currently, there is no wellknown method to determine the parameters in the PCAbased detection methods [2]. Furthermore, large-volume traffic anomalies and the stealthy poisoning attacks can contaminate normal traffic patterns [3]. Last, PCA requires a singular value decomposition (SVD) of a n × m matrix.…”
Section: Introductionmentioning
confidence: 99%