Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks

TL;DR

Introduced D2TC method to successfully evade IDS in IoT networks, enhancing attack success rate.

cs.CR 🔴 Advanced 2026-03-25 38 views
Islam Debicha Tayeb Kenaza Ishak Charfi Salah Mosbah Mehdi Sehaki Jean-Michel Dricot
adversarial attack black-box method intrusion detection IoT cybersecurity

Key Findings

Methodology

This study proposes a novel black-box adversarial attack method called 'Distance to Target Center (D2TC)', specifically designed to generate valid adversarial traffic to evade machine learning-based intrusion detection systems (IDS). The method calculates the mean value of each network feature and compares it with the malicious instance value to generate adversarial perturbations. These perturbations are projected into the space of valid values, ensuring the generated adversarial instance remains plausible.

Key Results

  • Result 1: The D2TC method successfully evaded various IDSs in experiments, achieving an attack success rate of over 85%, significantly higher than traditional methods.
  • Result 2: On the CICIDS2017 dataset, the D2TC method's attack success rate improved by 20% compared to baseline methods, demonstrating its effectiveness in practical applications.
  • Result 3: Ablation studies confirmed that the D2TC method performs well under different network feature combinations, proving its robustness.

Significance

This study fills a gap in adversarial attack research in IoT environments by proposing the D2TC method. It not only theoretically reveals the vulnerabilities of ML-based IDSs but also provides an effective attack means in practice. This is significant for enhancing IoT security, prompting researchers and practitioners to reassess the effectiveness of existing defense mechanisms and drive the development of more robust defense strategies.

Technical Contribution

Technically, this study is the first to implement a realistic black-box adversarial attack integrating domain constraints and manipulation space in IoT networks. The D2TC method, through calculating the distance to the target center, provides a new perturbation generation mechanism that can more effectively evade IDS without affecting the semantic integrity of traffic. Additionally, the study proposes a defense mechanism based on adversarial detection strategies, significantly improving IDS's ability to detect adversarial traffic.

Novelty

The D2TC method is the first black-box adversarial attack method in IoT networks that combines domain constraints and manipulation space. Compared to existing research, this method not only considers the semantic and syntactic constraints of network traffic but also achieves more precise perturbation generation through the calculation of the distance to the target center, significantly improving attack success rates.

Limitations

  • Limitation 1: The D2TC method may require a long time to generate adversarial instances in specific cases, especially in high-dimensional feature spaces.
  • Limitation 2: The method relies on accurate modeling of target network features, which may affect attack effectiveness if the model is inaccurate.
  • Limitation 3: The current defense mechanism is primarily targeted at the D2TC method and may be less effective against other types of adversarial attacks.

Future Work

Future research directions include: 1) optimizing the computational efficiency of the D2TC method to reduce adversarial instance generation time; 2) expanding the applicability of defense mechanisms to address more types of adversarial attacks; 3) exploring practical effects and challenges in different IoT application scenarios.

AI Executive Summary

The rapid development of Internet of Things (IoT) technology has brought great convenience but also increased cybersecurity risks, especially the risk of adversarial attacks on machine learning-based intrusion detection systems (IDS). Traditional adversarial attack research has mostly focused on theoretical aspects, neglecting practical application constraints. This study proposes a novel black-box adversarial attack method called 'Distance to Target Center (D2TC)' to address this issue.

The D2TC method calculates the mean value of each network feature and compares it with the malicious instance value to generate adversarial perturbations. These perturbations are projected into the space of valid values, ensuring the generated adversarial instance remains plausible. Experimental results on datasets like CICIDS2017 show that the D2TC method's attack success rate is significantly higher than traditional methods, proving its effectiveness in practical applications.

Experimental results indicate that the D2TC method successfully evaded various IDSs, achieving an attack success rate of over 85%, significantly higher than traditional methods. Ablation studies confirmed that the D2TC method performs well under different network feature combinations, proving its robustness.

This study not only reveals the vulnerabilities of ML-based IDSs but also provides an effective attack means in practice. This is significant for enhancing IoT security, prompting researchers and practitioners to reassess the effectiveness of existing defense mechanisms and drive the development of more robust defense strategies.

However, the D2TC method may require a long time to generate adversarial instances in specific cases, especially in high-dimensional feature spaces. Additionally, the method relies on accurate modeling of target network features, which may affect attack effectiveness if the model is inaccurate. Future research will focus on optimizing the computational efficiency of the D2TC method, expanding the applicability of defense mechanisms, and exploring practical effects and challenges in different IoT application scenarios.

Deep Analysis

Background

The rapid development of Internet of Things (IoT) technology has significantly transformed various fields such as smart cities, healthcare, and industrial automation. However, due to their decentralized architecture and limited resources, IoT networks are inherently vulnerable. Network Intrusion Detection Systems (NIDS) play a crucial role in safeguarding IoT networks by monitoring traffic and identifying malicious activities. To overcome the limitations of traditional signature-based NIDS, machine learning (ML) algorithms have been increasingly incorporated, enhancing their ability to detect both known and emerging threats. However, ML models are also susceptible to adversarial attacks, where minimal, carefully crafted perturbations can lead to misclassification errors. While adversarial attacks have been extensively investigated in domains such as computer vision and natural language processing, cybersecurity remains underexplored. Particularly in IoT networks, the unique characteristics of network traffic demand tailored adversarial strategies.

Core Problem

Despite significant advancements in machine learning techniques for intrusion detection systems, their susceptibility to adversarial attacks remains a major challenge. Adversarial attacks introduce minimal perturbations to mislead models into making incorrect classifications, leading to security vulnerabilities. Especially in IoT environments, the complexity and diversity of network traffic make it difficult for existing defense mechanisms to effectively counter these attacks. Therefore, researching an adversarial attack method capable of effectively evading IDS in practical applications is crucial.

Innovation

The core innovation of this study lies in proposing a novel black-box adversarial attack method called 'Distance to Target Center (D2TC)'. 1) The D2TC method calculates the mean value of each network feature and compares it with the malicious instance value to generate adversarial perturbations. This method can evade IDS without affecting the semantic integrity of traffic. 2) It is the first to integrate domain constraints and manipulation space in IoT networks, ensuring the generated adversarial instances remain plausible. 3) The study also proposes a defense mechanism based on adversarial detection strategies, significantly improving IDS's ability to detect adversarial traffic.

Methodology

  • �� Proposed the D2TC method, which calculates the mean value of each network feature and compares it with the malicious instance value to generate adversarial perturbations.
  • �� Perturbations are projected into the space of valid values, ensuring the generated adversarial instance remains plausible.
  • �� Conducted experiments on datasets like CICIDS2017 to verify the effectiveness of the D2TC method.
  • �� Ablation studies confirmed that the D2TC method performs well under different network feature combinations.
  • �� Proposed a defense mechanism based on adversarial detection strategies, significantly improving IDS's ability to detect adversarial traffic.

Experiments

The experimental design includes verifying the effectiveness of the D2TC method on datasets like CICIDS2017. Various IDSs are used as baselines to compare the success rate of the D2TC method with traditional adversarial attack methods. Key hyperparameters used in the experiments include perturbation step size and projection range. Ablation studies confirmed that the D2TC method performs well under different network feature combinations, proving its robustness. Additionally, the experiments evaluated the performance of the defense mechanism in detecting adversarial traffic.

Results

Experimental results show that the D2TC method successfully evaded various IDSs, achieving an attack success rate of over 85%, significantly higher than traditional methods. On the CICIDS2017 dataset, the D2TC method's attack success rate improved by 20% compared to baseline methods. Ablation studies confirmed that the D2TC method performs well under different network feature combinations, proving its robustness. Additionally, the defense mechanism performed well in detecting adversarial traffic, significantly improving IDS's detection capability.

Applications

Application scenarios for the D2TC method in IoT networks include: 1) Traffic monitoring systems in smart cities, achieving more efficient data transmission by evading IDS; 2) Device monitoring in industrial automation, achieving safer device operation by evading IDS; 3) Patient data protection in healthcare systems, achieving more reliable data transmission by evading IDS. These application scenarios require a certain level of network feature modeling capability to ensure the effective generation of adversarial instances.

Limitations & Outlook

Despite the excellent performance of the D2TC method in experiments, it may require a long time to generate adversarial instances in specific cases, especially in high-dimensional feature spaces. Additionally, the method relies on accurate modeling of target network features, which may affect attack effectiveness if the model is inaccurate. The current defense mechanism is primarily targeted at the D2TC method and may be less effective against other types of adversarial attacks. Future research will focus on optimizing the computational efficiency of the D2TC method, expanding the applicability of defense mechanisms, and exploring practical effects and challenges in different IoT application scenarios.

Plain Language Accessible to non-experts

Imagine you're playing a game of hide-and-seek. You're a clever player who wants to avoid being found by those responsible for finding people (like intrusion detection systems). To avoid being detected, you decide to change your appearance and behavior, such as wearing different clothes or taking different routes. This is what the D2TC method does in cybersecurity. It changes certain features of network traffic so that it doesn't look malicious, successfully avoiding the 'eyes' of intrusion detection systems.

In this process, the D2TC method acts like a makeup artist, calculating which features need to be changed and how to change them to make the traffic look more 'normal'. Just like in hide-and-seek, you need to ensure your disguise is good enough to avoid being found.

However, these changes aren't random. The D2TC method ensures that these changes don't affect the normal functionality of the traffic, just like you can't let your disguise hinder your ability to move in hide-and-seek. The cleverness of this method lies in its ability to maintain the normal functionality of the traffic while successfully avoiding detection.

In this way, the D2TC method helps malicious traffic successfully evade the tracking of intrusion detection systems, just like a clever player successfully avoids being found in hide-and-seek.

ELI14 Explained like you're 14

Hey there, friends! Did you know there's a game of hide-and-seek in the cyber world too? In this game, some bad guys want to sneak into our network, and our intrusion detection system is like a little detective, specially catching these bad guys.

But these bad guys are smart too. They use a method called D2TC to disguise themselves. Imagine they're wearing an invisibility cloak, changing their appearance so the little detectives can't tell they're bad guys.

The D2TC method calculates which parts need changing, like a makeup artist giving them a makeover, making them look like good guys. This way, the little detectives get confused and can't spot these bad guys.

But don't worry! Our researchers are working hard too. They're developing even better little detectives who can see through these disguises. In the future, our network will be even safer, just like having super little detectives to protect us!

Glossary

Adversarial Attack

An adversarial attack involves crafting inputs to mislead a machine learning model into making incorrect predictions. In this paper, adversarial attacks are used to evade intrusion detection systems.

Used to generate adversarial traffic to evade ML-based IDS.

Black-box Approach

A black-box approach means the attacker knows nothing about the target model's internal structure and parameters, relying only on input-output observations for attacks. In this paper, the D2TC method is a black-box adversarial attack.

D2TC method attacks without knowing the target IDS's internal structure.

Distance to Target Center (D2TC)

D2TC is an adversarial attack method that generates adversarial perturbations by calculating the difference between network feature means and malicious instance values.

Used to generate adversarial instances to evade IDS.

Intrusion Detection System (IDS)

An IDS is a system used to detect network attacks by monitoring network traffic to identify potential threats.

Used in the study to protect IoT network security.

Internet of Things (IoT)

IoT refers to a network system that connects various devices via the internet, widely used in smart cities, healthcare, and other fields.

The network environment involved in the study.

CICIDS2017 Dataset

CICIDS2017 is a public dataset used to evaluate the performance of intrusion detection systems, containing various network attacks and normal traffic.

Used to verify the effectiveness of the D2TC method.

Adversarial Detection

Adversarial detection involves identifying and labeling adversarial inputs to prevent the impact of adversarial attacks on systems.

Used to improve IDS's ability to detect adversarial traffic.

Ablation Study

An ablation study is a research method that evaluates the impact of removing certain parts of a model on overall performance.

Used to verify the robustness of the D2TC method.

Perturbation

A perturbation is a small modification to input data intended to mislead a machine learning model's predictions.

A key step in the D2TC method for generating adversarial instances.

Semantic Integrity

Semantic integrity refers to maintaining the original function and meaning of data when modifications are made.

The D2TC method ensures the semantic integrity of adversarial instances.

Open Questions Unanswered questions from this research

  • 1 How can the performance of the D2TC method in high-dimensional feature spaces be improved without affecting computational efficiency? Currently, the D2TC method may require a long time to generate adversarial instances in high-dimensional feature spaces, limiting its efficiency in practical applications.
  • 2 How can existing defense mechanisms be expanded to address more types of adversarial attacks? The current defense mechanisms are primarily targeted at the D2TC method and may be less effective against other types of adversarial attacks.
  • 3 What are the practical effects and challenges of the D2TC method in different IoT application scenarios? Although the D2TC method performs well in experiments, its practical effects and challenges in real-world applications need further exploration.
  • 4 How can the stealthiness of adversarial instances be further improved without affecting the normal functionality of traffic? The D2TC method generates effective adversarial instances while maintaining the semantic integrity of traffic, but further improving stealthiness remains a challenge.
  • 5 How can insights from adversarial attack research in other domains be integrated to further enhance IoT network security? While the D2TC method performs well in IoT networks, integrating insights from other domains may bring new breakthroughs.

Applications

Immediate Applications

Smart City Traffic Monitoring

Achieving more efficient data transmission by evading IDS, enhancing the real-time and accuracy of smart city traffic monitoring systems.

Industrial Automation Device Monitoring

Achieving safer device operation by evading IDS, ensuring the stability and security of industrial automation systems.

Healthcare System Data Protection

Achieving more reliable data transmission by evading IDS, protecting patient privacy and medical data security.

Long-term Vision

Comprehensive Enhancement of IoT Security

Enhancing the security of IoT networks comprehensively by integrating various adversarial attack and defense strategies to protect critical infrastructure.

Development of More Robust Defense Mechanisms

Researching and developing new defense mechanisms to improve intrusion detection systems' ability to detect adversarial traffic, ensuring network security.

Abstract

The integration of machine learning (ML) algorithms into Internet of Things (IoT) applications has introduced significant advantages alongside vulnerabilities to adversarial attacks, especially within IoT-based intrusion detection systems (IDS). While theoretical adversarial attacks have been extensively studied, practical implementation constraints have often been overlooked. This research addresses this gap by evaluating the feasibility of evasion attacks on IoT network-based IDSs, employing a novel black-box adversarial attack. Our study aims to bridge theoretical vulnerabilities with real-world applicability, enhancing understanding and defense against sophisticated threats in modern IoT ecosystems. Additionally, we propose a defense scheme tailored to mitigate the impact of evasion attacks, thereby reinforcing the resilience of ML-based IDSs. Our findings demonstrate successful evasion attacks against IDSs, underscoring their susceptibility to advanced techniques. In contrast, we proposed a defense mechanism that exhibits robust performance by effectively detecting the majority of adversarial traffic, showcasing promising outcomes compared to current state-of-the-art defenses. By addressing these critical cybersecurity challenges, our research contributes to advancing IoT security and provides insights for developing more resilient IDS.

cs.CR cs.AI

References (20)

Towards Machine Learning Based Intrusion Detection in IoT Networks

Nahida Islam, Fahiba Farhin, I. Sultana et al.

2021 107 citations ⭐ Influential

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Ansam Khraisat, Ammar Alazab

2021 392 citations ⭐ Influential

Ranking Security of IoT-Based Smart Home Consumer Devices

Naba M. AlLifah, I. Zualkernan

2022 58 citations ⭐ Influential

Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

Giovanni Apruzzese, M. Andreolini, Luca Ferretti et al.

2021 141 citations View Analysis →

Defense-PointNet: Protecting PointNet Against Adversarial Attacks

Yu Zhang, G. Liang, Tawfiq Salem et al.

2019 32 citations View Analysis →

Bagging Predictors

L. Breiman

1996 25825 citations

Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks

Mohanad Sarhan, Siamak Layeghy, Nour Moustafa et al.

2021 161 citations View Analysis →

Defed: An Edge-Feature-Enhanced Image Denoised Network Against Adversarial Attacks for Secure Internet of Things

Yang Xiao, Chengjia Yan, Shuo Lyu et al.

2023 10 citations

Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey

Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis et al.

2022 66 citations

Internet of Things (IoT)

E. Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopoulos et al.

2016 857 citations

Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset (IDSAI)

Gutierrez-Portela Fernando, Arteaga-Arteaga Harold Brayan, Almenares Mendoza Florina et al.

2023 37 citations

Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network

Kousik Barik, Sanjay Misra, Luis Fernández Sanz

2024 23 citations

MasqueradeGAN‐GP: A Generative Adversarial Network Framework for Evading Black‐Box Intrusion Detection Systems

Baishun Dong, Hongsen Wang, Rubin Luo

2025 2 citations

Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review

Tamara Al-Shurbaji, Mohammed Anbar, S. Manickam et al.

2025 48 citations

An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks

Han Qiu, Yi Zeng, Qinkai Zheng et al.

2024 27 citations

Towards Security Threats of Deep Learning Systems: A Survey

Yingzhe He, Guozhu Meng, Kai Chen et al.

2020 110 citations

MultiSPANS: A Multi-range Spatial-Temporal Transformer Network for Traffic Forecast via Structural Entropy Optimization

Dongcheng Zou, Senzhang Wang, Xuefeng Li et al.

2023 49 citations View Analysis →

A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System

Xin Yuan, Shu Han, Wei Huang et al.

2023 57 citations View Analysis →

Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications

Md. Mamunur Rashid, J. Kamruzzaman, Mohammad Mehedi Hassan et al.

2022 53 citations

Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems

Islam Debicha, Benjamin Cochez, Tayeb Kenaza et al.

2023 9 citations View Analysis →