Adversarial Sample Attack and Defense Method for Encrypted Traffic Data

被引:11
作者
Ding, Yi [1 ,2 ]
Zhu, Guiqin [1 ]
Chen, Dajiang [1 ]
Qin, Xue [3 ]
Cao, Mingsheng [1 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Network & Data Secur Key Lab Sichuan Prov, Chengdu 610054, Sichuan, Peoples R China
[2] Ningbo WebKing Technol Joint Stock Co Ltd, Ningbo 315000, Zhejiang, Peoples R China
[3] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
基金
中国国家自然科学基金;
关键词
Cryptography; Deep learning; Convolutional neural networks; Resists; Training; Classification algorithms; Task analysis; Encrypted traffic classification; adversarial sample attack; adversarial defense; deep learning; COOPERATIVE SPECTRUM ACCESS; CLASSIFICATION; INTERNET;
D O I
10.1109/TITS.2022.3154884
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Resisting the adversarial sample attack on encrypted traffic is a challenging task in the Intelligent Transportation System. This paper focuses on the classification, adversarial samples attack and defense method for the encrypted traffic. To be more specific, the one-dimensional encrypted traffic data is firstly translated into the two-dimensional images for further utilization. Then different classification networks based on the deep learning algorithm are adopted to classify the encrypted traffic data. Moreover, various adversarial sample generation methods are employed to generate the adversarial sample to implement the attacking process on the classification network. Furthermore, the passive and active defense method are proposed to resist the adversarial sample attack: 1) the passive defense is used to denoise the perturbation in the adversarial sample and to restore to the original image; and 2) the active defense is used to resist the adversarial sample attack by leveraging the adversarial training method, which can improve the robustness of the classification network. We conduct the extensive experiments on the ISCXVPN2016 dataset to evaluate the effectiveness of classification, adversarial sample attacking and defending.
引用
收藏
页码:18024 / 18039
页数:16
相关论文
共 50 条
[11]   Conditional Generative Adversarial Networks with Adversarial Attack and Defense for Generative Data Augmentation [J].
Baek, Francis ;
Kim, Daeho ;
Park, Somin ;
Kim, Hyoungkwan ;
Lee, SangHyun .
JOURNAL OF COMPUTING IN CIVIL ENGINEERING, 2022, 36 (03)
[12]   Adversarial Defense on Harmony: Reverse Attack for Robust AI Models Against Adversarial Attacks [J].
Kim, Yebon ;
Jung, Jinhyo ;
Kim, Hyunjun ;
So, Hwisoo ;
Ko, Yohan ;
Shrivastava, Aviral ;
Lee, Kyoungwoo ;
Hwang, Uiwon .
IEEE ACCESS, 2024, 12 :176485-176497
[13]   SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection [J].
Bar, Rotem ;
Hajaj, Chen .
IEEE ACCESS, 2022, 10 :56952-56960
[14]   Adversarial attack defense analysis: An empirical approach in cybersecurity perspective [J].
Barik, Kousik ;
Misra, Sanjay .
SOFTWARE IMPACTS, 2024, 21
[15]   Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network [J].
Mao, Jiaming ;
Zhang, Mingming ;
Chen, Mu ;
Chen, Lu ;
Xia, Fei ;
Fan, Lei ;
Wang, ZiXuan ;
Zhao, Wenbing .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 39 (03) :373-390
[16]   Adversarial Attack and Defense: A Survey [J].
Liang, Hongshuo ;
He, Erlu ;
Zhao, Yangyang ;
Jia, Zhe ;
Li, Hao .
ELECTRONICS, 2022, 11 (08)
[17]   A TARGETED ADVERSARIAL ATTACK METHOD FOR MULTI-CLASSIFICATION MALICIOUS TRAFFIC DETECTION [J].
Sun, Peishuai ;
Si, Chengxiang ;
Li, Shuhao ;
Cheng, Zhenyu ;
Zhao, Shuyuan ;
Liu, Qingyun .
2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, :4765-4769
[18]   A Comprehensive Review and Analysis of Deep Learning-Based Medical Image Adversarial Attack and Defense [J].
Muoka, Gladys W. ;
Yi, Ding ;
Ukwuoma, Chiagoziem C. ;
Mutale, Albert ;
Ejiyi, Chukwuebuka J. ;
Mzee, Asha Khamis ;
Gyarteng, Emmanuel S. A. ;
Alqahtani, Ali ;
Al-antari, Mugahed A. .
MATHEMATICS, 2023, 11 (20)
[19]   Investigating the Factors Impacting Adversarial Attack and Defense Performances in Federated Learning [J].
Aljaafari, Nura ;
Nazzal, Mahmoud ;
Sawalmeh, Ahmad H. ;
Khreishah, Abdallah ;
Anan, Muhammad ;
Algosaibi, Abdulelah ;
Alnaeem, Mohammed Abdulaziz ;
Aldalbahi, Adel ;
Alhumam, Abdulaziz ;
Vizcarra, Conrado P. .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 :12542-12555
[20]   Adversarial Attack and Defense on Deep Learning for Air Transportation Communication Jamming [J].
Liu, Mingqian ;
Zhang, Zhenju ;
Chen, Yunfei ;
Ge, Jianhua ;
Zhao, Nan .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (01) :973-986