Publication | Closed Access
Stealthy poisoning attacks on PCA-based anomaly detectors
62
Citations
6
References
2009
Year
Anomaly DetectionEngineeringInformation SecurityNetwork AnalysisInformation ForensicsComprehensive ViewMisbehaviour DetectionData ScienceData MiningPattern RecognitionDenial-of-service AttackPca-based DetectorsIntrusion Detection SystemThreat DetectionKnowledge DiscoveryComputer ScienceStealthy Boiling FrogPca-based Anomaly DetectorsData SecurityCryptographyNetwork Science
We consider systems that use PCA-based detectors obtained from a comprehensive view of the network's traffic to identify anomalies in backbone networks. To assess these detectors' susceptibility to adversaries wishing to evade detection, we present and evaluate short-term and long-term data poisoning schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boiling Frog attacks significantly reduce chaff volume,while only moderately increasing poisoning duration. ROC curves provide a comprehensive analysis of PCA-based detection on contaminated data, and show that even small attacks can undermine this otherwise successful anomaly detector.
| Year | Citations | |
|---|---|---|
Page 1
Page 1