Open Access iconOpen Access

ARTICLE

DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme

Dawei Xu1,2,3, Yue Lv1, Min Wang1, Baokun Zheng4,*, Jian Zhao1,3, Jiaxuan Yu5

1 College of Computer Science and Technology, Changchun University, Changchun, 130022, China
2 School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, 100081, China
3 Key Laboratory of Intelligent Rehabilitation and Barrier-free for the Disabled (Changchun University), Ministry of Education, Changchun, 130022, China
4 School of Information Management for Law, China University of Political Science and Law, Beijing, 102249, China
5 College of Artificial Intelligence, Nankai University, Tianjin, 300350, China

* Corresponding Author: Baokun Zheng. Email: email

Computers, Materials & Continua 2025, 84(1), 1731-1746. https://doi.org/10.32604/cmc.2025.064833

Abstract

Network intrusion detection systems (IDS) are a prevalent method for safeguarding network traffic against attacks. However, existing IDS primarily depend on machine learning (ML) models, which are vulnerable to evasion through adversarial examples. In recent years, the Wasserstein Generative Adversarial Network (WGAN), based on Wasserstein distance, has been extensively utilized to generate adversarial examples. Nevertheless, several challenges persist: (1) WGAN experiences the mode collapse problem when generating multi-category network traffic data, leading to subpar quality and insufficient diversity in the generated data; (2) Due to unstable training processes, the authenticity of the data produced by WGAN is often low. This study improves WGAN to address these issues and proposes a new adversarial sample generation algorithm called Distortion Enhanced Multi-Generator Generative Adversarial Network (DEMGAN). DEMGAN effectively evades ML-based IDS by proficiently obfuscating network traffic data samples. We assess the efficacy of our attack method against five ML-based IDS using two public datasets. The results demonstrate that our method can successfully bypass IDS, achieving average evasion rates of 97.42% and 87.51%, respectively. Furthermore, empirical findings indicate that retraining the IDS with the generated adversarial samples significantly bolsters the system’s capability to detect adversarial samples, resulting in an average recognition rate increase of 86.78%. This approach not only enhances the performance of the IDS but also strengthens the network’s resilience against potential threats, thereby optimizing network security measures.

Keywords

Adversarial attacks; intrusion detection; adversarial traffic examples; DEMGAN

Cite This Article

APA Style
Xu, D., Lv, Y., Wang, M., Zheng, B., Zhao, J. et al. (2025). DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme. Computers, Materials & Continua, 84(1), 1731–1746. https://doi.org/10.32604/cmc.2025.064833
Vancouver Style
Xu D, Lv Y, Wang M, Zheng B, Zhao J, Yu J. DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme. Comput Mater Contin. 2025;84(1):1731–1746. https://doi.org/10.32604/cmc.2025.064833
IEEE Style
D. Xu, Y. Lv, M. Wang, B. Zheng, J. Zhao, and J. Yu, “DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme,” Comput. Mater. Contin., vol. 84, no. 1, pp. 1731–1746, 2025. https://doi.org/10.32604/cmc.2025.064833



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 430

    View

  • 209

    Download

  • 0

    Like

Share Link