skip to main content
poster

Stealthy poisoning attacks on PCA-based anomaly detectors

Published:16 October 2009Publication History
Skip Abstract Section

Abstract

We consider systems that use PCA-based detectors obtained from a comprehensive view of the network's traffic to identify anomalies in backbone networks. To assess these detectors' susceptibility to adversaries wishing to evade detection, we present and evaluate short-term and long-term data poisoning schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boiling Frog attacks significantly reduce chaff volume,while only moderately increasing poisoning duration. ROC curves provide a comprehensive analysis of PCA-based detection on contaminated data, and show that even small attacks can undermine this otherwise successful anomaly detector.

References

  1. M. Barreno, B. Nelson, R. Sears, A.D. Joseph, and J.D. Tygar. "Can machine learning be secure?". In Proc. ASIACCS'06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Lakhina, M. Crovella, and C. Diot. "Diagnosing network-wide traffic anomalies". In Proc. SIGCOMM'04, pages 219--230, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Oetiker. The Multi Router Traffic Grapher. http://oss.oetiker.ch/mrtg/, 2008.Google ScholarGoogle Scholar
  4. H. Ringberg, A. Soule, J. Rexford, and C. Diot. "Sensitivity of PCA for traffic anomaly detection". Proc. SIGMETRICS 07, 35(1):109--120, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B.I.P. Rubinstein, B. Nelson, L. Huang, A.D. Joseph, S. Lau, N. Taft, and D. Tygar. "Compromising PCA-based anomaly detectors for network-wide traffic". Technical Report No. UCB/EECS-2008-73, EECS Department, University of California, Berkeley, 2008.Google ScholarGoogle Scholar
  6. B.I.P. Rubinstein, B. Nelson, L. Huang, A.D. Joseph, S. Lau, N. Taft, and J.D. Tygar. "Evading anomaly detection through variance injection attacks on PCA" (extended abstract). In Recent Advances in Intrusion Detection, volume 5230/2008 of Lecture Notes in Computer Science, pages 394--395, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan. "Network anomography". In Proc. IMC 05, pages 1--14, NY, NY, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Stealthy poisoning attacks on PCA-based anomaly detectors

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader