Tuesday, September 20, 2022

Подрывают изнутри

Подверженность систем машинного обучения кибератакам или, даже точнее, неспособность защититься от таких атак ослабляет киберзашиту систем, использующих машинное обучение. Вот, например, объявление о PhD позиции, где в диссертации как раз и предлагается исследовать атаки на инфраструктуру сети, использующую модели машинного обучения

Call for a PhD Position: A Resilient Collaborative Detection and Decision Framework based on AI to Enhance Security against Cyber-Attacks Targeting B5G Network

Short description:

The main purpose of this PhD thesis is to propose and develop innovative collaborative detection (prediction) and decision-making techniques based on machine learning algorithms to protect the critical components of 5G’s RAN from smart and complex attacks such as AI-related attackers and unknown threats. Among the main components of 5G’s RAN that are attractive targets of attackers, we cite Control Unit (CU), Decision Unit (DU), Radio Unit (RU).

The idea is that the AI detection and decision systems that will be proposed by the PhD will be activated at each critical virtual function and collaborate between each other to detect the unknown attacks’ misbehavior (i.e., zero-day attacks), while taking into account the network metrics such as latency, communication overhead and packets lost. The expected results of the PhD can be summarized as follows:

- Propose new AI-related attacks models of the B5G’s RAN.

- Propose resilient collaborative hybrid detection systems able to detect the known and unknown attacks’ misbehaviors and to be resilient against the AI-related attackers targeting the critical components of 5G’s RAN (where the detection system is activated).

- Propose a mathematical model of collaborative cyber decision-making systems. This model investigates the behaviors of suspected attackers by monitoring the interaction between the hybrid detection system and these attackers with the goal to refine the detection provided by the hybrid system, i.e., reduces further the false positive rate.

- Conceive a Proof of Concept (PoC) for the resilient collaborative detection (prediction) and cyber decision-making systems that take into account the security and B5G network metrics, such as detection and false positive rates, reaction time, latency, computation overhead and packets lost. The PoC will be embedded within Virtual Network Functions (VNFs) deployed within testbed network (such as Open-Air Interface).

- Interact with 3GPP Ericsson experts (SA5 and SA3) for a possibility to standardize a part or all the software building blocks of the resilient collaborative detection and cyber decision-making systems.

The main innovative aspect of this PhD thesis is to study the optimal combination between the signature-based detection and machine learning based detection techniques with a goal to leverage the advantages of each detection technique against unknown threats and to be resilient from AI-related attacks. In addition, the PhD thesis will focus on proposing a new reaction mechanism based on a decision –making model (e.g., by using game theory) to address the decision-making issue and hence reduce further the false positive rate.


Some references:
[1] M. Geller, P. Nair, “B5G Security Innovation with Cisco”, Cisco White Paper, 2018.
[2] A.S. Mamolar, Z. Pervez, Q. Wang, J.M.A. Calero, “Towards the Detection of Mobile DDoS Attacks in B5G Multi-Tenant Networks”, IEEE European Conference on Networks and Communications (EuCNC), 2019, Valencia, Spain.
[3] L. F. Maimó, Á. L. P. Gómez, F. J. G. Clemente, M. G. Pérez, and G. M. Pérez, "A Self-Adaptive Deep Learning-Based System for Anomaly Detection in B5G Networks," IEEE Access, Special Issue on Cyber-Physical-Social Computing and Networking, vol. 6, pp. 7700-7712, February 2018.
[4] V. Richariya, U. P. Singh, and R. Mishra, “Distributed approach of intrusion detection system: Survey,'' Int. J. Adv. Comput. Res., vol. 2, no. 6, pp. 358-363, 2012.
[5] S. A. R. Shah and B. Issac, ``Performance comparison of intrusion detection systems and application of machine learning to Snort system,'' Future Generat. Comput. Syst., vol. 80, pp. 157-170, Mar. 2018.
[6] Z. Md. Fadlullah, T. Taleb, A. V. Vasilakos, M. Guizani, and N. Kato,“DTRAB: combating against attacks on encrypted protocols throughtraffic-feature analysis,” IEEE/ACM Trans. Netw., vol. 18, no. 4,pp. 1234–1247, Aug. 2010.
[7]V. Bardia, C. Kumar, “End Users Can Mitigate Zero Day Attacks Faster”, 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, India.
[8] C. Musca, E. Mirica, R. Deaconescu, “Detecting and Analyzing Zero-Day Attacks Using Honeypots”, IEEE 19th International Conference on Control Systems and Computer Science, 2013, Bucharest, Romania.
[9] A. Gupta, R. Kumar Jha, P. Gandotra, S. Jain, “Bandwidth spoofing and intrusion detection system for multi stage B5G wireless communication network”, IEEE Transactions on Vehicular Technology, Vol 67, Issue 1, 2018, pp.618-632.
[10] A.S. Mamolar, Z. Pervez, J.M.A. Calero, A.M. Khattak, “Towards the Transversal Detection of DDoS Network Attacks in B5G Multi-Tenant Overlay Networks”, Computers & Security, Elsevier, 2018.
[11] J. Ni, X. Li, X-S. Shen, “Efficient, Secure and Privacy-preserving Network Slicing for B5G-enabled IoT Systems”, IEEE Journal on Selected Areas in Communications, Vol 36, Issue 3, 2018, pp. 644-657.

К ссылкам можно добавить атаки на инфраструктуру 5G, например:
Apruzzese G. et al. Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples //IEEE Transactions on Network and Service Management. – 2022.
Kim B. et al. Adversarial attacks on deep learning based mmWave beam prediction in 5G and beyond //2021 IEEE Statistical Signal Processing Workshop (SSP). – IEEE, 2021. – С. 590-594.

См. также другие публикации по теме adversarial, посвященные устойчивому машинному обучению

No comments: