NetDiffuser: Deceiving DNN-Based Network Attack Detection Systems with Diffusion-Generated Adversarial Traffic

📅 2026-03-09
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work proposes NetDiffuser, a novel framework for generating natural adversarial examples against deep learning-based network intrusion detection systems (NIDS), which are vulnerable to such attacks yet resistant to existing adversarial traffic generation methods. NetDiffuser innovatively integrates feature disentanglement with diffusion models: it first identifies semantically meaningful and relatively independent features within network traffic through feature decomposition, then leverages a diffusion model to inject perturbations that preserve semantic consistency while maximizing realism. The resulting adversarial samples exhibit high fidelity and effectiveness across diverse NIDS architectures. Experimental results on three benchmark datasets demonstrate that NetDiffuser achieves up to a 29.93% increase in attack success rate and reduces the AUC-ROC of adversarial sample detection by as much as 0.534, significantly outperforming current state-of-the-art baselines.

Technology Category

Application Category

📝 Abstract
Deep learning (DL)-based Network Intrusion Detection System (NIDS) has demonstrated great promise in detecting malicious network traffic. However, they face significant security risks due to their vulnerability to adversarial examples (AEs). Most existing adversarial attacks maliciously perturb data to maximize misclassification errors. Among AEs, natural adversarial examples (NAEs) are particularly difficult to detect because they closely resemble real data, making them challenging for both humans and machine learning models to distinguish from legitimate inputs. Creating NAEs is crucial for testing and strengthening NIDS defenses. This paper proposes NetDiffuser1, a novel framework for generating NAEs capable of deceiving NIDS. NetDiffuser consists of two novel components. First, a new feature categorization algorithm is designed to identify relatively independent features in network traffic. Perturbing these features minimizes changes while preserving network flow validity. The second component is a novel application of diffusion models to inject semantically consistent perturbations for generating NAEs. NetDiffuser performance was extensively evaluated using three benchmark NIDS datasets across various model architectures and state-of-the-art adversarial detectors. Our experimental results show that NetDiffuser achieves up to a 29.93% higher attack success rate and reduces AE detection performance by at least 0.267 (in some cases up to 0.534) in the Area under the Receiver Operating Characteristic Curve (AUC-ROC) score compared to the baseline attacks.
Problem

Research questions and friction points this paper is trying to address.

adversarial examples
network intrusion detection
natural adversarial examples
deep learning security
traffic perturbation
Innovation

Methods, ideas, or system contributions that make the work stand out.

Natural Adversarial Examples
Diffusion Models
Network Intrusion Detection System
Feature Categorization
Adversarial Traffic Generation
🔎 Similar Papers
No similar papers found.
P
Pratyay Kumar
Department of Computer Science, New Mexico State University, Las Cruces, NM, USA
A
Abu Saleh Md Tayeen
University of Hartford, CT, USA
S
Satyajayant Misra
Department of Computer Science, New Mexico State University, Las Cruces, NM, USA
Huiping Cao
Huiping Cao
Professor of Computer Science, New mexico State University
Data miningdatabasesapplied machine learninggraph analysistime series analysis
J
Jiefei Liu
Department of Computer Science, New Mexico State University, Las Cruces, NM, USA
Q
Qixu Gong
Department of Computer Science, New Mexico State University, Las Cruces, NM, USA
J
Jayashree Harikumar
DEVCOM Analysis Center, WSMR, NM, USA