Adversarial Sample Attack and Defense Method for Encrypted Traffic Data

被引:11
作者
Ding, Yi [1 ,2 ]
Zhu, Guiqin [1 ]
Chen, Dajiang [1 ]
Qin, Xue [3 ]
Cao, Mingsheng [1 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Network & Data Secur Key Lab Sichuan Prov, Chengdu 610054, Sichuan, Peoples R China
[2] Ningbo WebKing Technol Joint Stock Co Ltd, Ningbo 315000, Zhejiang, Peoples R China
[3] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
基金
中国国家自然科学基金;
关键词
Cryptography; Deep learning; Convolutional neural networks; Resists; Training; Classification algorithms; Task analysis; Encrypted traffic classification; adversarial sample attack; adversarial defense; deep learning; COOPERATIVE SPECTRUM ACCESS; CLASSIFICATION; INTERNET;
D O I
10.1109/TITS.2022.3154884
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Resisting the adversarial sample attack on encrypted traffic is a challenging task in the Intelligent Transportation System. This paper focuses on the classification, adversarial samples attack and defense method for the encrypted traffic. To be more specific, the one-dimensional encrypted traffic data is firstly translated into the two-dimensional images for further utilization. Then different classification networks based on the deep learning algorithm are adopted to classify the encrypted traffic data. Moreover, various adversarial sample generation methods are employed to generate the adversarial sample to implement the attacking process on the classification network. Furthermore, the passive and active defense method are proposed to resist the adversarial sample attack: 1) the passive defense is used to denoise the perturbation in the adversarial sample and to restore to the original image; and 2) the active defense is used to resist the adversarial sample attack by leveraging the adversarial training method, which can improve the robustness of the classification network. We conduct the extensive experiments on the ISCXVPN2016 dataset to evaluate the effectiveness of classification, adversarial sample attacking and defending.
引用
收藏
页码:18024 / 18039
页数:16
相关论文
共 50 条
[41]   A Data Augmentation-Based Defense Method Against Adversarial Attacks in Neural Networks [J].
Zeng, Yi ;
Qiu, Han ;
Memmi, Gerard ;
Qiu, Meikang .
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT II, 2020, 12453 :274-289
[42]   ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT Traffic [J].
Zhang, Yijing ;
Xue, Hui ;
Lin, Jianjun ;
Liu, Xiaoyu ;
Gai, Weilin ;
Yang, Xiaodu ;
Wang, Anqi ;
Yue, Yinliang ;
Sun, Bo .
2023 IFIP NETWORKING CONFERENCE, IFIP NETWORKING, 2023,
[43]   Deep Image Restoration Model: A Defense Method Against Adversarial Attacks [J].
Ali, Kazim ;
Quershi, Adnan N. ;
Bin Arifin, Ahmad Alauddin ;
Bhatti, Muhammad Shahid ;
Sohail, Abid ;
Hassan, Rohail .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02) :2209-2224
[44]   TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [J].
Sharon, Yam ;
Berend, David ;
Liu, Yang ;
Shabtai, Asaf ;
Elovici, Yuval .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :3225-3237
[45]   OFEI: A Semi-Black-Box Android Adversarial Sample Attack Framework Against DLaaS [J].
Xu, Guangquan ;
Xin, Guohua ;
Jiao, Litao ;
Liu, Jian ;
Liu, Shaoying ;
Feng, Meiqi ;
Zheng, Xi .
IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (04) :956-969
[46]   HYBRID ADVERSARIAL SAMPLE CRAFTING FOR BLACK-BOX EVASION ATTACK [J].
Zheng, Juan ;
He, Zhimin ;
Lin, Zhe .
2017 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2017, :236-242
[47]   Traffic Flow Imputation Using Parallel Data and Generative Adversarial Networks [J].
Chen, Yuanyuan ;
Lv, Yisheng ;
Wang, Fei-Yue .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (04) :1624-1630
[48]   Scattering Model Guided Adversarial Examples for SAR Target Recognition: Attack and Defense [J].
Peng, Bowen ;
Peng, Bo ;
Zhou, Jie ;
Xie, Jianyue ;
Liu, Li .
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2022, 60
[49]   Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies [J].
Shi, Yi ;
Sagduyu, Yalin E. ;
Erpek, Tugba ;
Davaslioglu, Kemal ;
Lu, Zhuo ;
Li, Jason H. .
2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
[50]   A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy [J].
Chen, Zigang ;
Wang, Zhen ;
Zhou, Yuening ;
Liu, Fan ;
Liu, Yuhong ;
Leng, Tao ;
Zhu, Haihua .
COMPUTERS & SECURITY, 2024, 144