Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification

被引:52
作者
Sadeghzadeh, Amir Mahdi [1 ]
Shiravi, Saeed [1 ]
Jalili, Rasool [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran 1136511155, Iran
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 02期
关键词
IP networks; Robustness; Payloads; Perturbation methods; Training; Protocols; Feature extraction; Network traffic classification; adversarial network traffic; deep learning; adversarial example; adversarial machine learning; APP IDENTIFICATION;
D O I
10.1109/TNSM.2021.3052888
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network traffic classification is used in various applications such as network traffic management, policy enforcement, and intrusion detection systems. Although most applications encrypt their network traffic and some of them dynamically change their port numbers, Machine Learning (ML) and especially Deep Learning (DL)-based classifiers have shown impressive performance in network traffic classification. In this article, we evaluate the robustness of DL-based network traffic classifiers against Adversarial Network Traffic (ANT). ANT causes DL-based network traffic classifiers to predict incorrectly using Universal Adversarial Perturbation (UAP) generating methods. Since there is no need to buffer network traffic before sending ANT, it is generated live. We partition the input space of the DL-based network traffic classification into three categories: packet classification, flow content classification, and flow time series classification. To generate ANT, we propose three new attacks injecting UAP into network traffic. AdvPad attack injects a UAP into the content of packets to evaluate the robustness of packet classifiers. AdvPay attack injects a UAP into the payload of a dummy packet to evaluate the robustness of flow content classifiers. AdvBurst attack injects a specific number of dummy packets with crafted statistical features based on a UAP into a selected burst of a flow to evaluate the robustness of flow time series classifiers. The results indicate injecting a little UAP into network traffic, highly decreases the performance of DL-based network traffic classifiers in all categories.
引用
收藏
页码:1962 / 1976
页数:15
相关论文
共 29 条
[1]  
Abe Kota, 2016, Proceedings of the Asia-Pacific Advanced Network, V42, P15
[2]   Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (02) :445-458
[3]   QoS-Classifier for VPN and Non-VPN traffic based on time-related features [J].
Andres Caicedo-Munoz, Julian ;
Ledezma Espino, Agapito ;
Carlos Corrales, Juan ;
Rendon, Alvaro .
COMPUTER NETWORKS, 2018, 144 :271-279
[4]  
[Anonymous], 2017, ADVERSARIAL PATCH
[5]   A Survey of Predictive Modeling on Im balanced Domains [J].
Branco, Paula ;
Torgo, Luis ;
Ribeiro, Rita P. .
ACM COMPUTING SURVEYS, 2016, 49 (02)
[6]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[7]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[8]   Quantifying the accuracy of the ground truth associated with Internet traffic traces [J].
Dusi, Maurizio ;
Gringoli, Francesco ;
Salgarelli, Luca .
COMPUTER NETWORKS, 2011, 55 (05) :1158-1167
[9]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[10]  
Goodfellow I. J., 2014, INT C LEARNING REPRE