Adversarial Sample Attack and Defense Method for Encrypted Traffic Data

被引:12
作者
Ding, Yi [1 ,2 ]
Zhu, Guiqin [1 ]
Chen, Dajiang [1 ]
Qin, Xue [3 ]
Cao, Mingsheng [1 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Network & Data Secur Key Lab Sichuan Prov, Chengdu 610054, Sichuan, Peoples R China
[2] Ningbo WebKing Technol Joint Stock Co Ltd, Ningbo 315000, Zhejiang, Peoples R China
[3] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
基金
中国国家自然科学基金;
关键词
Cryptography; Deep learning; Convolutional neural networks; Resists; Training; Classification algorithms; Task analysis; Encrypted traffic classification; adversarial sample attack; adversarial defense; deep learning; COOPERATIVE SPECTRUM ACCESS; CLASSIFICATION; INTERNET;
D O I
10.1109/TITS.2022.3154884
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Resisting the adversarial sample attack on encrypted traffic is a challenging task in the Intelligent Transportation System. This paper focuses on the classification, adversarial samples attack and defense method for the encrypted traffic. To be more specific, the one-dimensional encrypted traffic data is firstly translated into the two-dimensional images for further utilization. Then different classification networks based on the deep learning algorithm are adopted to classify the encrypted traffic data. Moreover, various adversarial sample generation methods are employed to generate the adversarial sample to implement the attacking process on the classification network. Furthermore, the passive and active defense method are proposed to resist the adversarial sample attack: 1) the passive defense is used to denoise the perturbation in the adversarial sample and to restore to the original image; and 2) the active defense is used to resist the adversarial sample attack by leveraging the adversarial training method, which can improve the robustness of the classification network. We conduct the extensive experiments on the ISCXVPN2016 dataset to evaluate the effectiveness of classification, adversarial sample attacking and defending.
引用
收藏
页码:18024 / 18039
页数:16
相关论文
共 50 条
[31]   Adversarial Attack and Defense in Breast Cancer Deep Learning Systems [J].
Li, Yang ;
Liu, Shaoying .
BIOENGINEERING-BASEL, 2023, 10 (08)
[32]   Attack-Aware Detection and Defense to Resist Adversarial Examples [J].
Jiang, Wei ;
He, Zhiyuan ;
Zhan, Jinyu ;
Pan, Weijia .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (10) :2194-2198
[33]   An Adversarial Attack via Penalty Method [J].
Sun, Jiyuan ;
Yu, Haibo ;
Zhao, Jianjun .
IEEE ACCESS, 2025, 13 :18123-18140
[34]   Data Drift in DL: Lessons Learned from Encrypted Traffic Classification [J].
Malekghaini, Navid ;
Akbari, Elham ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Boutaba, Raouf ;
Mathieu, Bertrand ;
Moteau, Stephanie ;
Tuffin, Stephane .
2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
[35]   ADVERSARIAL DEFENSE VIA THE DATA-DEPENDENT ACTIVATION, TOTAL VARIATION MINIMIZATION, AND ADVERSARIAL TRAINING [J].
Wang, Bao ;
Lin, Alex ;
Yin, Penghang ;
Zhu, Wei ;
Bertozzi, Andrea L. ;
Osher, Stanley J. .
INVERSE PROBLEMS AND IMAGING, 2021, 15 (01) :129-145
[36]   Sample-analysis based adversarial attack with saliency map [J].
Zhang, Dian ;
Dong, Yunwei ;
Yang, Yun .
APPLIED SOFT COMPUTING, 2024, 161
[37]   Black-box adversarial attack defense approach: An empirical analysis from cybersecurity perceptive [J].
Barik, Kousik ;
Misra, Sanjay ;
Lopez-Baldominos, Ines .
RESULTS IN ENGINEERING, 2025, 26
[38]   ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense [J].
Wang, Ren ;
Chen, Tianqi ;
Yao, Philip ;
Liu, Sijia ;
Rajapakse, Indika ;
Hero, Alfred O., III .
IEEE ACCESS, 2022, 10 :103074-103088
[39]   Deep learning for encrypted traffic classification in the face of data drift: An empirical study [J].
Malekghaini, Navid ;
Akbari, Elham ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Boutaba, Raouf ;
Mathieu, Bertrand ;
Moteau, Stephanie ;
Tuffin, Stephane .
COMPUTER NETWORKS, 2023, 225
[40]   Low-cost Adversarial Stealthy False Data Injection Attack and Detection Method [J].
Huang D. ;
Ding Z. ;
Hu A. ;
Wang X. ;
Shi S. .
Dianwang Jishu/Power System Technology, 2023, 47 (04) :1531-1539