Adversarial Attacks on Pre-trained Deep Learning Models for Encrypted Traffic Analysis

被引:0
作者
Seok, Byoungjin [1 ]
Sohn, Kiwook [2 ]
机构
[1] Korea Univ, Seoul, South Korea
[2] Seoul Natl Univ Sci & Technol, Seoul, South Korea
来源
JOURNAL OF WEB ENGINEERING | 2024年 / 23卷 / 06期
关键词
Encrypted traffic analysis; adversarial attacksx; pre-trained deep learning models; bert; web security; CLASSIFICATION;
D O I
10.13052/jwe1540-9589.2361
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
For web security, it's essential to accurately classify traffic across variousweb applications to detect malicious activities lurking within network traffic.However, the encryption protocols for privacy protection, such as TLS 1.3and IPSec, make it difficult to apply traditional traffic classification methodslike deep packet inspection (DPI). Recently, the advent of deep learninghas significantly advanced the field of encrypted traffic analysis (ETA),outperforming traditional traffic analysis approaches. Notably, pre-traineddeep learning based ETA models have demonstrated superior analyticalcapabilities. However, the security aspects of these deep learning modelsare often overlooked during the design and development process. In thispaper, we conducted adversarial attacks to evaluate the security of pre-trainedETA models. We targeted ET-BERT, a state-of-the-art model demonstratingsuperior performance, to generate adversarial traffic examples. To carry outthe adversarial example generation, we drew inspiration from adversarial attacks on discrete data, such as natural language, defining fluency from anetwork traffic perspective and proposing a new attack algorithm that canpreserve this fluency. Finally, in our experiments, we showed our target modelis vulnerable to the proposed adversarial attacks.
引用
收藏
页码:749 / 768
页数:20
相关论文
共 26 条
[1]   Independent comparison of popular DPI tools for traffic classification [J].
Bujlow, Tomasz ;
Carela-Espanol, Valentin ;
Barlet-Ros, Pere .
COMPUTER NETWORKS, 2015, 76 :75-89
[2]  
Devlin J, 2019, Arxiv, DOI [arXiv:1810.04805, DOI 10.48550/ARXIV.1810.04805]
[3]   EC-GCN: A encrypted traffic classification framework based on multi-scale graph convolution networks [J].
Diao, Zulong ;
Xie, Gaogang ;
Wang, Xin ;
Ren, Rui ;
Meng, Xuying ;
Zhang, Guangxing ;
Xie, Kun ;
Qiao, Mingyu .
COMPUTER NETWORKS, 2023, 224
[4]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[5]  
Gage P., 1994, The C Users Journal, V12, P23
[6]  
He H.Y., 2020, 2020 ITU Kaleidoscope: Industry-Driven Digital Transformation, ITU K, P1
[7]   CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method [J].
Hu, Xinyi ;
Gu, Chunxiang ;
Chen, Yihang ;
Wei, Fushan .
SENSORS, 2021, 21 (24)
[8]   Semi-Supervised Encrypted Traffic Classification With Deep Convolutional Generative Adversarial Networks [J].
Iliyasu, Auwal Sani ;
Deng, Huifang .
IEEE ACCESS, 2020, 8 :118-126
[9]  
Jin D, 2020, AAAI CONF ARTIF INTE, V34, P8018
[10]   Characterization of Tor Traffic using Time based Features [J].
Lashkari, Arash Habibi ;
Gil, Gerard Draper ;
Mamun, Mohammad Saiful Islam ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :253-262