Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection

被引:2
|
作者
Peng, Zuquan [1 ]
He, Yuanyuan [1 ]
Sun, Zhe [2 ]
Ni, Jianbing [3 ]
Niu, Ben [4 ]
Deng, Xianjun [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON, Canada
[4] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious URL; adversarial examples; deep learning; adversarial training;
D O I
10.1109/ICC45855.2022.9838536
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Detecting malicious URLs is of great significance to reduce cyber crimes and maintain Internet security. Currently, Deep Learning (DL) techniques have been widely used to improve the classical malicious URL detection models, as DL-based detection models can perform an in-depth analysis of the text information of the URL, and detect the fishing URLs of unknown cyber attack types with high accuracy. Any missed blocking of malicious URLs can potentially result in a huge loss of information and property. In this paper, we focus on the vulnerability of the existing DL-based malicious URL detection models and show that they are sensitive to adversarial samples. First, we construct URL adversarial samples based on the component-level and character-level perturbations and use them to attack mainstream DL-based detection models, resulting in obvious decreases in the detection accuracies. Meanwhile, the perturbations are under the constraints that each adversarial sample URL is hardly distinguished from the original URL with naked eyes. Furthermore, under most circumstances, the adversarial samples constructed by replacing 14 types of characters and perturbing other all components except the scheme component lead to the largest increased number of missed blocking of malicious URLs, i.e., a bigger drop in the accuracy than other constructed methods. Finally, extensive experiments demonstrate the effectiveness of our adversarial examples. Even if the adversarial training is used against our adversarial samples, the adversarial samples still work and bring oblivious decreases in their accuracy.
引用
收藏
页码:3118 / 3123
页数:6
相关论文
共 50 条
  • [1] Using Adversarial Examples to Bypass Deep Learning Based URL Detection System
    Chen, Wencheng
    Zeng, Yi
    Qiu, Meikang
    [J]. 4TH IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2019) / 3RD INTERNATIONAL SYMPOSIUM ON REINFORCEMENT LEARNING (ISRL 2019), 2019, : 128 - 130
  • [2] An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
    Nowroozi, Ehsan
    Abhishek, Mohammadreza
    Mohammadi, Mohammadreza
    Conti, Mauro
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1332 - 1344
  • [3] Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection
    Shang, Fute
    Wang, Buhong
    Li, Tengyao
    Tian, Jiwei
    Cao, Kunrui
    Guo, Rongxiao
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (10) : 1734 - 1737
  • [4] Adversarial attack for deep-learning-based fault diagnosis models
    Ge, Yipei
    Wang, Huan
    Liu, Zhiliang
    [J]. 2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 757 - 761
  • [5] A Deep Learning Based Online Malicious URL and DNS Detection Scheme
    Jiang, Jianguo
    Chen, Jiuming
    Choo, Kim-Kwang Raymond
    Liu, Chao
    Liu, Kunying
    Yu, Min
    Wang, Yongjian
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 438 - 448
  • [6] Malicious URL Detection based on Machine Learning
    Cho Do Xuan
    Hoa Dinh Nguyen
    Nikolaevich, Tisenko Victor
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 148 - 153
  • [7] Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples
    Zhang, Ziwei
    Ye, Dengpan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples
    Zhang, Ziwei
    Ye, Dengpan
    [J]. Security and Communication Networks, 2022, 2022
  • [9] Semi-supervised learning approach for malicious URL detection via adversarial learning
    Ling, Jie
    Xiong, Su
    Luo, Yu
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 41 (02) : 3083 - 3092
  • [10] Deep-Learning-Based Approach for IoT Attack and Malware Detection
    Taşcı, Burak
    [J]. Applied Sciences (Switzerland), 2024, 14 (18):