Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic

被引:0
|
作者
Sun, Hanwu [1 ,2 ]
Peng, Chengwei [3 ]
Sang, Yafei [1 ,2 ]
Li, Shuhao [1 ,2 ]
Zhang, Yongzheng [4 ]
Zhu, Yujia [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Natl Comp Network Emergency Response Tech Team Co, Beijing, Peoples R China
[4] China Assets Cybersecur Technol Co, Beijing, Peoples R China
关键词
Transferable adversarial traffic; Encrypted traffic classifiers; Adversarial example attack; Black-box attack; NETWORK; ROBUSTNESS;
D O I
10.1007/978-3-031-24386-8_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine learning algorithms have been widely leveraged in traffic classification tasks to overcome the challenges brought by the enormous encrypted traffic. On the contrary, ML-based classifiers introduce adversarial example attacks, which can fool the classifiers into giving wrong outputs with elaborately designed examples. Some adversarial attacks have been proposed to evaluate and improve the robustness of ML-based traffic classifiers. Unfortunately, it is impractical for these attacks to assume that the adversary can run the target classifiers locally (white-box). Even some GAN-based black-box attacks still require the target classifiers to act as discriminators. We fill the gap by proposing FAT (We use FAT rather than TAT to imporove readability.), a novel black-box adversarial traffic attack framework, which generates the transFerable Adversarial Traffic to evade ML-based encrypted traffic classifiers. The key novelty of FAT is two-fold: i) FAT does not assume that the adversary can obtain the target classifier. Specifically, FAT builds proxy classifiers to mimic the target classifiers and generates transferable adversarial traffic to misclassify the target classifiers. ii) FAT makes adversarial traffic attacks more practical by translating adversarial features into traffic. We use two datasets, CICIDS-2017 and MTA, to evaluate the effectiveness of FAT against seven common ML-based classifiers. The experimental results show that FAT achieves an average evasion detection rate (EDR) of 86.7%, which is higher than the state-of-the-art black-box attack by 34.4%.
引用
收藏
页码:153 / 173
页数:21
相关论文
共 50 条
  • [21] STrans-GAN: Spatially-Transferable Generative Adversarial Networks for Urban Traffic Estimation
    Zhang, Yingxue
    Li, Yanhua
    Zhou, Xun
    Kong, Xiangnan
    Luo, Jun
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2022, : 743 - 752
  • [22] Transferable Adversarial Training: A General Approach to Adapting Deep Classifiers
    Liu, Hong
    Long, Mingsheng
    Wang, Jianmin
    Jordan, Michael I.
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 97, 2019, 97
  • [23] From traffic classes to content: A hierarchical approach for encrypted traffic classification
    Li, Ying
    Huang, Yi
    Seneviratne, Suranga
    Thilakarathna, Kanchana
    Cheng, Adriel
    Jourjon, Guillaume
    Webb, Darren
    Smith, David B.
    Xu, Richard Yi Da
    COMPUTER NETWORKS, 2022, 212
  • [24] Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features
    Xu, Shi-Jie
    Geng, Guang-Gang
    Jin, Xiao-Bo
    Liu, Dong-Jie
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2166 - 2181
  • [25] CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification
    Dong, Cong
    Zhang, Chen
    Lu, Zhigang
    Liu, Baoxu
    Jiang, Bo
    COMPUTER NETWORKS, 2020, 176
  • [26] Source identification of encrypted video traffic in the presence of heterogeneous network traffic
    Shi, Yan
    Ross, Arun
    Biswas, Subir
    COMPUTER COMMUNICATIONS, 2018, 129 : 101 - 110
  • [27] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [28] Detecting Ransomware in Encrypted Web Traffic
    Modi, Jaimin
    Traore, Issa
    Ghaleb, Asem
    Ganame, Karim
    Ahmed, Sherif
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 345 - 353
  • [29] Is Encrypted ClientHello a Challenge for Traffic Classification?
    Shamsimukhametov, Danil
    Kurapov, Anton
    Liubogoshchev, Mikhail
    Khorov, Evgeny
    IEEE ACCESS, 2022, 10 : 77883 - 77897
  • [30] The seven myths of encrypted traffic scanning
    Lueck M.
    Network Security, 2021, 2021 (07) : 9 - 12