Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification

被引:0
作者
Li, Meimei [1 ]
Xu, Yiyan [1 ]
Li, Nan [1 ]
Jin, Zhongfeng [1 ]
机构
[1] Univ Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
来源
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM | 2022年
关键词
network traffic classification; adversarial sample; deep learning; adversarial training;
D O I
10.1109/TrustCom56396.2022.00154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The network traffic data is easily monitored and obtained by attackers. Attacks against different network traffic threaten the environment of the intranet. Deep learning methods have been widely used to classify network traffic for their high classification performance. The application of adversarial samples in computer vision confirms that deep learning methods are flawed, allowing existing methods to generate incorrect results with high confidence. In this paper, the adversarial samples are used on the network traffic classification model, causing the CNN model to produce incorrect classification results for network traffic. By training the classification model adversarially, we validate the training effect and improve the classification accuracy by means of the FGSM attack method. By using the adversarial samples to the network traffic data, our approach enables proactive defence against intranet eavesdropping before the attack occurs by influencing the attacker's classification model to misclassify.
引用
收藏
页码:1123 / 1128
页数:6
相关论文
共 14 条
[1]   Modeling Internet backbone traffic at the flow level [J].
Barakat, C ;
Thiran, P ;
Iannaccone, G ;
Diot, C ;
Owezarski, P .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (08) :2111-2124
[2]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[3]   Packet-level traffic measurements from the Sprint IP backbone [J].
Fraleigh, C ;
Moon, S ;
Lyles, B ;
Cotton, C ;
Khan, M ;
Moll, D ;
Rockell, R ;
Seely, T ;
Diot, C .
IEEE NETWORK, 2003, 17 (06) :6-16
[4]  
He T, 2003, 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, P98
[5]  
Hu Y, 2020, J COMMUNICATIONS, V41, P12
[6]  
ILYAS A, 2018, BLACK BOX ADVERSARIA
[7]  
Madry A., 2018, ICLR
[8]   DeepFool: a simple and accurate method to fool deep neural networks [J].
Moosavi-Dezfooli, Seyed-Mohsen ;
Fawzi, Alhussein ;
Frossard, Pascal .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :2574-2582
[9]  
Saxe A. M., 2014, Computer Science
[10]  
Szegedy C, 2014, Arxiv, DOI [arXiv:1312.6199, DOI 10.1109/CVPR.2015.7298594]