FIELD: information technology.
SUBSTANCE: invention relates to information technology, in particular to information security, and can be used to train intrusion detection systems. In the method of generating adversarial examples for a network intrusion detection system, two checks are additionally carried out before testing in a real industrial control system, specifically estimating, for each found adversarial example, the perturbation tolerance applied to the original example, according to the specified allowable values in the selected feature space, and the result is used to check the dependence of the features or the found adversarial example is not accepted as an effective adversarial example. Further, a matrix of dependence of features in the formed feature space is formed, then for each feature of the found adversarial example, the value of which in the original example is changed, its dependent features defined in the feature dependency matrix are checked for change in the initial example and the result is used to proceed to testing or not to be accepted as an effective adversarial example.
EFFECT: technical result when generating adversarial examples for a network intrusion detection system is to increase the speed of searching for effective adversarial examples.
1 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR GENERATING ADVERSARIAL EXAMPLES FOR INTRUSION DETECTION SYSTEM OF INDUSTRIAL CONTROL SYSTEM | 2022 |
|
RU2805014C1 |
PROTECTION METHOD OF VEHICLE CONTROL SYSTEMS AGAINST INTRUSIONS | 2019 |
|
RU2737229C1 |
METHOD FOR DETECTING ANOMALIES IN OPERATION OF AUTOMATED SYSTEM NETWORK | 2020 |
|
RU2738460C1 |
SYSTEM AND METHOD OF AUTOGENERATION OF DECISION RULES FOR INTRUSION DETECTION SYSTEMS WITH FEEDBACK | 2016 |
|
RU2634209C1 |
SYSTEM AND METHOD FOR ANALYSING INCOMING TRAFFIC FLOW | 2023 |
|
RU2812087C1 |
METHOD FOR DETECTING NORMAL REACTIONS OF COMPUTER NETWORK NODES TO NETWORK PACKETS RELATED TO UNKNOWN TRAFFIC | 2022 |
|
RU2802164C1 |
METHOD OF DETECTING REMOTE ATTACKS ON AUTOMATED CONTROL SYSTEMS | 2016 |
|
RU2628913C1 |
METHOD FOR APPLYING PERSONAL DATA PROCESSING POLICIES FOR AN IoT DEVICE | 2021 |
|
RU2767714C1 |
SYSTEM AND METHOD OF CORRELATING EVENTS FOR DETECTING INFORMATION SECURITY INCIDENT | 2019 |
|
RU2739864C1 |
ADAPTIVE INFORMATION AND TECHNICAL MONITORING SYSTEM | 2019 |
|
RU2728763C1 |
Authors
Dates
2024-07-30—Published
2023-12-21—Filed