Adversarial Sample Attack and Defense Method for Encrypted Traffic Data

被引:11
作者
Ding, Yi [1 ,2 ]
Zhu, Guiqin [1 ]
Chen, Dajiang [1 ]
Qin, Xue [3 ]
Cao, Mingsheng [1 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Network & Data Secur Key Lab Sichuan Prov, Chengdu 610054, Sichuan, Peoples R China
[2] Ningbo WebKing Technol Joint Stock Co Ltd, Ningbo 315000, Zhejiang, Peoples R China
[3] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
基金
中国国家自然科学基金;
关键词
Cryptography; Deep learning; Convolutional neural networks; Resists; Training; Classification algorithms; Task analysis; Encrypted traffic classification; adversarial sample attack; adversarial defense; deep learning; COOPERATIVE SPECTRUM ACCESS; CLASSIFICATION; INTERNET;
D O I
10.1109/TITS.2022.3154884
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Resisting the adversarial sample attack on encrypted traffic is a challenging task in the Intelligent Transportation System. This paper focuses on the classification, adversarial samples attack and defense method for the encrypted traffic. To be more specific, the one-dimensional encrypted traffic data is firstly translated into the two-dimensional images for further utilization. Then different classification networks based on the deep learning algorithm are adopted to classify the encrypted traffic data. Moreover, various adversarial sample generation methods are employed to generate the adversarial sample to implement the attacking process on the classification network. Furthermore, the passive and active defense method are proposed to resist the adversarial sample attack: 1) the passive defense is used to denoise the perturbation in the adversarial sample and to restore to the original image; and 2) the active defense is used to resist the adversarial sample attack by leveraging the adversarial training method, which can improve the robustness of the classification network. We conduct the extensive experiments on the ISCXVPN2016 dataset to evaluate the effectiveness of classification, adversarial sample attacking and defending.
引用
收藏
页码:18024 / 18039
页数:16
相关论文
共 50 条
[21]   FastTraffic: A lightweight method for encrypted traffic fast classification [J].
Xu, Yuwei ;
Cao, Jie ;
Song, Kehui ;
Xiang, Qiao ;
Cheng, Guang .
COMPUTER NETWORKS, 2023, 235
[22]   Attack as Defense: Characterizing Adversarial Examples using Robustness [J].
Zhao, Zhe ;
Chen, Guangke ;
Wang, Jingyi ;
Yang, Yiwei ;
Song, Fu ;
Sun, Jun .
ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, :42-55
[23]   Review of Artificial Intelligence Adversarial Attack and Defense Technologies [J].
Qiu, Shilin ;
Liu, Qihe ;
Zhou, Shijie ;
Wu, Chunjiang .
APPLIED SCIENCES-BASEL, 2019, 9 (05)
[24]   Adversarial Attack and Defense on Discrete Time Dynamic Graphs [J].
Zhao, Ziwei ;
Yang, Yu ;
Yin, Zikai ;
Xu, Tong ;
Zhu, Xi ;
Lin, Fake ;
Li, Xueying ;
Chen, Enhong .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (12) :7600-7611
[25]   Generative Adversarial Networks: A Survey on Attack and Defense Perspective [J].
Zhang, Chenhan ;
Yu, Shui ;
Tian, Zhiyi ;
Yu, James J. Q. .
ACM COMPUTING SURVEYS, 2024, 56 (04)
[26]   D3AdvM: A direct 3D adversarial sample attack inside mesh data [J].
Xu, Huangxinxin ;
He, Fazhi ;
Fan, Linkun ;
Bai, Junwei .
COMPUTER AIDED GEOMETRIC DESIGN, 2022, 97
[27]   Adversarial attack evaluation and defense method for multimodal sentiment analysis model [J].
Fan F. ;
Nie X. ;
Deng X. ;
Liu S. .
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2023, 51 (02) :19-24
[28]   Generative Adversarial Network Based Image-Scaling Attack and Defense Modeling [J].
Li, Junjian ;
Chen, Honglong ;
Li, Zhe ;
Zhang, Anqing ;
Wang, Xiaomeng ;
Wang, Xingang ;
Xia, Feng .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2025, 9 (01) :861-873
[29]   Encrypted traffic classification method based on parallel traffic graph and graph neural network [J].
Liu, Taotao ;
Fu, Yu ;
Yu, Yihan ;
An, Yishuai .
Tongxin Xuebao/Journal on Communications, 2025, 46 (06) :45-59
[30]   Adversarial Attack and Defense in Breast Cancer Deep Learning Systems [J].
Li, Yang ;
Liu, Shaoying .
BIOENGINEERING-BASEL, 2023, 10 (08)