Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic

被引:0
|
作者
Sun, Hanwu [1 ,2 ]
Peng, Chengwei [3 ]
Sang, Yafei [1 ,2 ]
Li, Shuhao [1 ,2 ]
Zhang, Yongzheng [4 ]
Zhu, Yujia [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Natl Comp Network Emergency Response Tech Team Co, Beijing, Peoples R China
[4] China Assets Cybersecur Technol Co, Beijing, Peoples R China
关键词
Transferable adversarial traffic; Encrypted traffic classifiers; Adversarial example attack; Black-box attack; NETWORK; ROBUSTNESS;
D O I
10.1007/978-3-031-24386-8_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine learning algorithms have been widely leveraged in traffic classification tasks to overcome the challenges brought by the enormous encrypted traffic. On the contrary, ML-based classifiers introduce adversarial example attacks, which can fool the classifiers into giving wrong outputs with elaborately designed examples. Some adversarial attacks have been proposed to evaluate and improve the robustness of ML-based traffic classifiers. Unfortunately, it is impractical for these attacks to assume that the adversary can run the target classifiers locally (white-box). Even some GAN-based black-box attacks still require the target classifiers to act as discriminators. We fill the gap by proposing FAT (We use FAT rather than TAT to imporove readability.), a novel black-box adversarial traffic attack framework, which generates the transFerable Adversarial Traffic to evade ML-based encrypted traffic classifiers. The key novelty of FAT is two-fold: i) FAT does not assume that the adversary can obtain the target classifier. Specifically, FAT builds proxy classifiers to mimic the target classifiers and generates transferable adversarial traffic to misclassify the target classifiers. ii) FAT makes adversarial traffic attacks more practical by translating adversarial features into traffic. We use two datasets, CICIDS-2017 and MTA, to evaluate the effectiveness of FAT against seven common ML-based classifiers. The experimental results show that FAT achieves an average evasion detection rate (EDR) of 86.7%, which is higher than the state-of-the-art black-box attack by 34.4%.
引用
收藏
页码:153 / 173
页数:21
相关论文
共 50 条
  • [1] Backdoor Poisoning of Encrypted Traffic Classifiers
    Holodnak, John T.
    Brown, Olivia
    Matterer, Jason
    Lemke, Andrew
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW, 2022, : 577 - 585
  • [2] AdvTraffic: Obfuscating Encrypted Traffic with Adversarial Examples
    Liu, Hao
    Dani, Jimmy
    Yu, Hongkai
    Sun, Wenhai
    Wang, Boyang
    2022 IEEE/ACM 30TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2022,
  • [3] Adversarial Sample Attack and Defense Method for Encrypted Traffic Data
    Ding, Yi
    Zhu, Guiqin
    Chen, Dajiang
    Qin, Xue
    Cao, Mingsheng
    Qin, Zhiguang
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) : 18024 - 18039
  • [4] Towards universal and transferable adversarial attacks against network traffic classification
    Ding, Ruiyang
    Sun, Lei
    Zang, Weifei
    Dai, Leyu
    Ding, Zhiyi
    Xu, Bayi
    COMPUTER NETWORKS, 2024, 254
  • [5] Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis
    Li, Minghui
    Wu, Zhendong
    Chen, Keming
    Wang, Wenhai
    SYMMETRY-BASEL, 2022, 14 (11):
  • [6] Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks
    Maarouf, Ramy
    Sattar, Danish
    Matrawy, Ashraf
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [7] Evading PDF Malware Classifiers with Generative Adversarial Network
    Wang, Yaxiao
    Li, Yuanzhang
    Zhang, Quanxin
    Hu, Jingjing
    Kuang, Xiaohui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 374 - 387
  • [8] Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network
    Mao, Jiaming
    Zhang, Mingming
    Chen, Mu
    Chen, Lu
    Xia, Fei
    Fan, Lei
    Wang, ZiXuan
    Zhao, Wenbing
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 39 (03): : 373 - 390
  • [9] Research on malicious traffic identification technology in encrypted traffic
    Zeng Y.
    Wu Z.
    Dong L.
    Liu Z.
    Ma J.
    Li Z.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 170 - 187
  • [10] Comparing traffic classifiers
    Salgarelli, Luca
    Gringoli, Francesco
    Karagiannis, Thomas
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (03) : 65 - 68