Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic

被引:0
|
作者
Sun, Hanwu [1 ,2 ]
Peng, Chengwei [3 ]
Sang, Yafei [1 ,2 ]
Li, Shuhao [1 ,2 ]
Zhang, Yongzheng [4 ]
Zhu, Yujia [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Natl Comp Network Emergency Response Tech Team Co, Beijing, Peoples R China
[4] China Assets Cybersecur Technol Co, Beijing, Peoples R China
关键词
Transferable adversarial traffic; Encrypted traffic classifiers; Adversarial example attack; Black-box attack; NETWORK; ROBUSTNESS;
D O I
10.1007/978-3-031-24386-8_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine learning algorithms have been widely leveraged in traffic classification tasks to overcome the challenges brought by the enormous encrypted traffic. On the contrary, ML-based classifiers introduce adversarial example attacks, which can fool the classifiers into giving wrong outputs with elaborately designed examples. Some adversarial attacks have been proposed to evaluate and improve the robustness of ML-based traffic classifiers. Unfortunately, it is impractical for these attacks to assume that the adversary can run the target classifiers locally (white-box). Even some GAN-based black-box attacks still require the target classifiers to act as discriminators. We fill the gap by proposing FAT (We use FAT rather than TAT to imporove readability.), a novel black-box adversarial traffic attack framework, which generates the transFerable Adversarial Traffic to evade ML-based encrypted traffic classifiers. The key novelty of FAT is two-fold: i) FAT does not assume that the adversary can obtain the target classifier. Specifically, FAT builds proxy classifiers to mimic the target classifiers and generates transferable adversarial traffic to misclassify the target classifiers. ii) FAT makes adversarial traffic attacks more practical by translating adversarial features into traffic. We use two datasets, CICIDS-2017 and MTA, to evaluate the effectiveness of FAT against seven common ML-based classifiers. The experimental results show that FAT achieves an average evasion detection rate (EDR) of 86.7%, which is higher than the state-of-the-art black-box attack by 34.4%.
引用
收藏
页码:153 / 173
页数:21
相关论文
共 50 条
  • [31] Network Intrusion Detection in Encrypted Traffic
    Papadogiannaki, Eva
    Tsirantonakis, Giorgos
    Ioannidis, Sotiris
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [32] A Survey on Tor Encrypted Traffic Monitoring
    Aminuddin, Mohamad Amar Irsyad Mohd
    Zaaba, Zarul Fitri
    Singh, Manmeet Kaur Mahinderjit
    Singh, Darshan Singh Mahinder
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (08) : 113 - 120
  • [33] Feature analysis of encrypted malicious traffic
    Shekhawat, Anish Singh
    Di Troia, Fabio
    Stamp, Mark
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 125 : 130 - 141
  • [34] Traffic Classification in an Increasingly Encrypted Web
    Akbari, Iman
    Salahuddin, Mohammad A.
    Ven, Leni
    Limam, Noura
    Boutaba, Raouf
    Mathieu, Bertrand
    Moteau, Stephanie
    Tuffin, Stephane
    COMMUNICATIONS OF THE ACM, 2022, 65 (10) : 75 - 83
  • [35] Encrypted video traffic clustering demystified
    Dvir, Amit
    Marnerides, Angelos K.
    Dubin, Ran
    Golan, Nehor
    Hajaj, Chen
    COMPUTERS & SECURITY, 2020, 96
  • [36] Browser Identification Based on Encrypted Traffic
    Liu, Changjiang
    Han, Jiesi
    Wei, Qiang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 360 - 363
  • [37] Separating Flows in Encrypted Tunnel Traffic
    Hartl, Alexander
    Fabini, Joachim
    Zseby, Tanja
    2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, : 609 - 616
  • [38] Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples
    Martinez, Erick Eduardo Bernal
    Oh, Bella
    Li, Feng
    Luo, Xiao
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 143 - 155
  • [39] A feature-vector generative adversarial network for evading PDF malware classifiers
    Li, Yuanzhang
    Wang, Yaxiao
    Wang, Ye
    Ke, Lishan
    Tan, Yu-an
    INFORMATION SCIENCES, 2020, 523 (523) : 38 - 48
  • [40] Detection of DoH Traffic Tunnels Using Deep Learning for Encrypted Traffic Classification
    Alzighaibi, Ahmad Reda
    COMPUTERS, 2023, 12 (03)