Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification

被引:0
|
作者
Li, Meimei [1 ]
Xu, Yiyan [1 ]
Li, Nan [1 ]
Jin, Zhongfeng [1 ]
机构
[1] Univ Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
network traffic classification; adversarial sample; deep learning; adversarial training;
D O I
10.1109/TrustCom56396.2022.00154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The network traffic data is easily monitored and obtained by attackers. Attacks against different network traffic threaten the environment of the intranet. Deep learning methods have been widely used to classify network traffic for their high classification performance. The application of adversarial samples in computer vision confirms that deep learning methods are flawed, allowing existing methods to generate incorrect results with high confidence. In this paper, the adversarial samples are used on the network traffic classification model, causing the CNN model to produce incorrect classification results for network traffic. By training the classification model adversarially, we validate the training effect and improve the classification accuracy by means of the FGSM attack method. By using the adversarial samples to the network traffic data, our approach enables proactive defence against intranet eavesdropping before the attack occurs by influencing the attacker's classification model to misclassify.
引用
收藏
页码:1123 / 1128
页数:6
相关论文
共 50 条
  • [1] Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks
    Merzouk, Mohamed Amine
    Delas, Josephine
    Neal, Christopher
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [2] Adversarial Attacks on Deep Reinforcement Learning-based Traffic Signal Control Systems with Colluding Vehicles
    Qu, Ao
    Tang, Yihong
    Ma, Wei
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (06)
  • [3] Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification
    Sadeghzadeh, Amir Mahdi
    Shiravi, Saeed
    Jalili, Rasool
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1962 - 1976
  • [4] Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic
    Pantelakis, Vasileios
    Bountakas, Panagiotis
    Farao, Aristeidis
    Xenakis, Christos
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [5] Adversarial Attacks on Deep Learning-Based UAV Navigation Systems
    Mynuddin, Mohammed
    Khan, Sultan Uddin
    Mahmoud, Nabil Mahmoud
    Alsharif, Ahmad
    [J]. 2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [6] Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms
    Zhang, Chaoyun
    Costa-Perez, Xavier
    Patras, Paul
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (03) : 1294 - 1311
  • [7] A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification
    Telikani, Akbar
    Gandomi, Amir H.
    Choo, Kim-Kwang Raymond
    Shen, Jun
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01): : 661 - 670
  • [8] Deep Learning-Based Encrypted Network Traffic Classification and Resource Allocation in SDN
    Wu, Hao
    Zhang, Xi
    Yang, Jufeng
    [J]. JOURNAL OF WEB ENGINEERING, 2021, 20 (08): : 2319 - 2334
  • [9] AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery
    Chen, Jinyin
    Ge, Jie
    Zheng, Shilian
    Ye, Linhui
    Zheng, Haibin
    Shen, Weiguo
    Yue, Keqiang
    Yang, Xiaoniu
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (09) : 10698 - 10711
  • [10] Adversarial Attacks on Deep Learning-Based DOA Estimation With Covariance Input
    Yang, Zhuang
    Zheng, Shilian
    Zhang, Luxin
    Zhao, Zhijin
    Yang, Xiaoniu
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 1377 - 1381