4.5 Article

Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNSM.2021.3052888

关键词

IP networks; Robustness; Payloads; Perturbation methods; Training; Protocols; Feature extraction; Network traffic classification; adversarial network traffic; deep learning; adversarial example; adversarial machine learning

向作者/读者索取更多资源

This article evaluates the robustness of DL-based network traffic classifiers against Adversarial Network Traffic. The results suggest that injecting a little Universal Adversarial Perturbation into network traffic greatly decreases the performance of classifiers.
Network traffic classification is used in various applications such as network traffic management, policy enforcement, and intrusion detection systems. Although most applications encrypt their network traffic and some of them dynamically change their port numbers, Machine Learning (ML) and especially Deep Learning (DL)-based classifiers have shown impressive performance in network traffic classification. In this article, we evaluate the robustness of DL-based network traffic classifiers against Adversarial Network Traffic (ANT). ANT causes DL-based network traffic classifiers to predict incorrectly using Universal Adversarial Perturbation (UAP) generating methods. Since there is no need to buffer network traffic before sending ANT, it is generated live. We partition the input space of the DL-based network traffic classification into three categories: packet classification, flow content classification, and flow time series classification. To generate ANT, we propose three new attacks injecting UAP into network traffic. AdvPad attack injects a UAP into the content of packets to evaluate the robustness of packet classifiers. AdvPay attack injects a UAP into the payload of a dummy packet to evaluate the robustness of flow content classifiers. AdvBurst attack injects a specific number of dummy packets with crafted statistical features based on a UAP into a selected burst of a flow to evaluate the robustness of flow time series classifiers. The results indicate injecting a little UAP into network traffic, highly decreases the performance of DL-based network traffic classifiers in all categories.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Theory & Methods

AWA: Adversarial Website Adaptation

Amir Mahdi Sadeghzadeh, Behrad Tajali, Rasool Jalili

Summary: Adversarial Website Adaptation (AWA) uses adversarial deep learning approaches to defend against website fingerprinting attacks by creating unique transformers for each website to evade adversaries' classifiers, with both universal and non-universal versions available. By incorporating secret random elements in the training phase to generate sets of transformers, AWA can effectively combat adversarial attacks and reduce bandwidth overhead.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

暂无数据