"One Model Fits All Nodes": Neuron Activation Pattern Analysis-Based Attack Traffic Detection Framework for P2P Networks

被引:0
作者
Xu, Songsong [1 ]
Fu, Chuanpu [1 ]
Li, Qi [2 ]
Xu, Ke [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100084, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORKING | 2025年
基金
中国国家自然科学基金;
关键词
Neurons; Peer-to-peer computing; Traffic control; Analytical models; Brain modeling; Blockchains; Accuracy; Training; Predictive models; Transformers; Network security; machine learning (ML); P2P network; intrusion detection;
D O I
10.1109/TON.2025.3546735
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) based network attack traffic detection is an emerging security paradigm, which is capable of capturing various advanced network attacks according to the features of traffic. When leveraging such promising security application to protect P2P services, particularly distributed cryptocurrency systems, one detection model should be deployed on many nodes to handle various unseen traffic patterns generated by nodes around the world. However, unseen yet benign traffic patterns are commonly classified as attack traffic, and thus trigger massive false-positive (FP) alarms. Unfortunately, the common practice of retraining models to reduce FPs is not salable for large-scale P2P networks, which incurs prohibitive labor efforts of collecting traffic on each node individually. To effectively deploy ML based attack traffic detection systems to protect distributed networks, we present tNeuronthat automatically identifies FPs triggered by unseen traffic via neuron activation pattern analysis, such that it significantly improves the performance on various nodes. Specifically, we construct a shadow model with Transformer encoders to extract the knowledge of traffic patterns. Afterward, we train a model that learns how to classify FPs among alarms raised by ML models according to neuron activation patterns of the shadow model. Our experiments on real Ethereum nodes show that tNeuroncan reduce 83.40% FP for seven state-of-the-art ML based attack detection systems, when detecting 15 kinds of P2P network attacks, thereby significantly improving detection accuracy in nine different metrics. In addition, tNeuronis robust against various adversarial examples constructed by existing evasion attacks. Besides, it achieves real-time detection and is capable of handling massive FPs generated by many nodes in large-scale distributed networks.
引用
收藏
页数:16
相关论文
共 81 条
[1]  
Alahmadi BA, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P2783
[2]   Hijacking Bitcoin: Routing Attacks on Cryptocurrencies [J].
Apostolaki, Maria ;
Zohar, Aviv ;
Vanbever, Laurent .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :375-392
[3]  
Arp D, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P3971
[4]   Practical Traffic Analysis Attacks on Secure Messaging Applications [J].
Bahramali, Alireza ;
Houmansadr, Amir ;
Soltani, Ramin ;
Goeckel, Dennis ;
Towsley, Don .
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
[5]   FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications [J].
Barradas, Diogo ;
Santos, Nuno ;
Rodrigues, Luis ;
Signorello, Salvatore ;
Ramos, Fernando M., V ;
Madeira, Andre .
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
[6]  
Bartos K, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P807
[7]   Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking [J].
Bijmans, Hugo L. J. ;
Booij, Tim M. ;
Doerr, Christian .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :449-464
[8]  
Bilge L, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P129
[9]  
Bitcoin, A Peer-to-Peer Electronic Cash System
[10]  
Cao Y, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P209