Escape method of malicious traffic based on backdoor attack

被引:0
|
作者
Ma, Bowen [1 ]
Guo, Yuanbo [1 ]
Ma, Jun [1 ]
Zhang, Qi [1 ]
Fang, Chen [1 ]
机构
[1] Cryptography Engineering Institute, Information Engineering University, Zhengzhou,450001, China
来源
基金
中国国家自然科学基金;
关键词
Telecommunication traffic;
D O I
10.11959/j.issn.1000-436x.2024077
中图分类号
TB18 [人体工程学]; Q98 [人类学];
学科分类号
030303 ; 1201 ;
摘要
Launching backdoor attacks against deep learning (DL)-based network traffic classifiers, and a method of malicious traffic escape was proposed based on the backdoor attack. Backdoors were embedded in classifiers by mixing poisoned training samples with clean samples during the training process. These backdoor classifiers then identified the malicious traffic with an attacker-specific backdoor trigger as benign, allowing the malicious traffic to escape. Additionally, backdoor classifiers behaved normally on clean samples, ensuring the backdoor's concealment. Different backdoor triggers were adopted to generate various backdoor models, the effects of different malicious traffic on different backdoor models were compared, and the influence of different backdoors on the model's performance was analyzed. The effectiveness of the proposed method was verified through experiments, providing a new approach for escaping malicious traffic from classifiers. © 2024 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:73 / 83
相关论文
共 50 条
  • [1] Malicious attack detection based on traffic-flow information fusion
    Chen, Ye
    Lai, Yingxu
    Zhang, Zhaoyi
    Li, Hanmei
    Wang, Yuhang
    [J]. 2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
  • [2] ICMP Based Malicious Attack Identification Method for DHCP
    Yaibuates, Mayoon
    Chaisricharoen, Roungsan
    [J]. 2014 FOURTH JOINT INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONIC AND ELECTRICAL ENGINEERING (JICTEE 2014), 2014,
  • [3] TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers
    Ning, Rui
    Xin, Chunsheng
    Wu, Hongyi
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 1429 - 1438
  • [4] A General Backdoor Attack to Graph Neural Networks Based on Explanation Method
    Chen, Luyao
    Yan, Na
    Zhang, Boyang
    Wang, Zhaoyang
    Wen, Yu
    Hu, Yanfei
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 759 - 768
  • [5] A Non-injected Traffic Backdoor Attack on Deep Neural Network
    Wang, Jiahui
    Yang, Jie
    Ma, Binhao
    Wang, Dejun
    Meng, Bo
    [J]. International Journal of Network Security, 2023, 25 (04) : 640 - 648
  • [6] A Malicious Domains Detection Method Based on File Sandbox Traffic
    He, Daojing
    Dai, Jiayu
    Gu, Hongjie
    Zhu, Shanshan
    Chan, Sammy
    Su, Jingyong
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2023, 37 (06): : 182 - 188
  • [7] Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
    Nazzal, Mahmoud
    Aljaafari, Nura
    Sawalmeh, Ahmed
    Khreishah, Abdallah
    Anan, Muhammad
    Algosaibi, Abdulelah
    Alnaeem, Mohammed
    Aldalbahi, Adel
    Alhumam, Abdulaziz
    Vizcarra, Conrado P.
    Alhamed, Shadan
    [J]. 2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2023, : 204 - 209
  • [8] Research of Malicious Code Attack Effect Based on Synthetic Entropy Method
    Li Peng
    Wang Ruchuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (03) : 449 - 454
  • [9] An Efficient Method to Decide the Malicious Traffic: A Voting-Based Efficient Method
    Kumar, Ajay
    Singh, Jitendra
    Kumar, Vikas
    Shrivastava, Saurabh
    [J]. INTERNATIONAL JOURNAL OF DECISION SUPPORT SYSTEM TECHNOLOGY, 2023, 15 (01)
  • [10] A Method of Malicious Bot Traffic Detection
    Wu, Mengying
    Wu, Zhendong
    Lv, Hao
    Wang, Jingjing
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 67 - 76