Network Traffic Obfuscation against Traffic Classification

被引:0
|
作者
Liu, Likun [1 ]
Yu, Haining [1 ]
Yu, Shilin [2 ]
Yu, Xiangzhan [1 ]
机构
[1] Harbin Inst Technol, Sch Cyber Sci & Technol, Harbin 150001, Peoples R China
[2] Aerosp Sci & Ind Acad Intelligent Operat & Informa, Wuhan 430040, Peoples R China
基金
黑龙江省自然科学基金; 中国国家自然科学基金;
关键词
D O I
10.1155/2022/3104392
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, tremendous progress has been made in network traffic classification and its use has become ubiquitous in many emerging applications, such as Internet censorship in many countries and ISP traffic engineering. However, the traffic analysis of intermediaries brings the risk of privacy disclosure to users. This paper presents a network traffic obfuscation technology to resist traffic classification. It deceives the machine learning and deep learning models by generating adversarial samples. The adversarial samples generation algorithm includes a white-box attack algorithm based on fuzzy strategy and a black-box attack algorithm based on smote data enhancement. Experiments based on the ISCXTor2016 public data set show that the MIM algorithm has the best performance in white-box attacks, and the obfuscation success rate of DNN and LSTM models is 90%. In the black-box attack, the obfuscation effect of LSTM is the best, while CNN has stronger robustness.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification
    Hu, Yongjin
    Tian, Jin
    Ma, Jun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [2] Network Traffic Obfuscation and Automated Internet Censorship
    Dixon, Lucas
    Ristenpart, Thomas
    Shrimpton, Thomas
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (06) : 43 - 53
  • [3] Chaff Allocation and Performance for Network Traffic Obfuscation
    Ciftcioglu, Ertugrul N.
    Hardy, Rommie L.
    Chan, Kevin S.
    Scott, Lisa M.
    Oliveira, Diego F. M.
    Verma, Gunjan
    [J]. 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1565 - 1568
  • [4] SmartSwitch: Efficient Traffic Obfuscation Against Stream Fingerprinting
    Li, Haipeng
    Niu, Ben
    Wang, Boyang
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I, 2020, 335 : 255 - 275
  • [5] Marionette: A Programmable Network-Traffic Obfuscation System
    Dyer, Kevin P.
    Coull, Scott E.
    Shrimpton, Thomas
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 367 - 382
  • [6] Network Traffic Obfuscation: An Adversarial Machine Learning Approach
    Verma, Gunjan
    Ciftcioglu, Ertugrul
    Sheatsley, Ryan
    Chan, Kevin
    Scott, Lisa
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 413 - 418
  • [7] Evidential classification for defending against adversarial attacks on network traffic
    Beechey, Matthew
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos G.
    [J]. INFORMATION FUSION, 2023, 92 : 115 - 126
  • [8] InFeCT - Network Traffic Classification
    Teufl, Peter
    Payer, Udo
    Amling, Michael
    Godec, Martin
    Ruff, Stefan
    Scheikl, Gerhard
    Walzl, Gernot
    [J]. ICN 2008: SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING, PROCEEDINGS, 2008, : 439 - +
  • [9] Robust Network Traffic Classification
    Zhang, Jun
    Chen, Xiao
    Xiang, Yang
    Zhou, Wanlei
    Wu, Jie
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (04) : 1257 - 1270
  • [10] Classification of Network Traffic in LAN
    Langthasa, Biswajit
    Acharya, Bikash
    Sarmah, Satyajit
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN, COMPUTER NETWORKS & AUTOMATED VERIFICATION (EDCAV), 2015, : 92 - 99