Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic

被引:0
|
作者
Sun, Hanwu [1 ,2 ]
Peng, Chengwei [3 ]
Sang, Yafei [1 ,2 ]
Li, Shuhao [1 ,2 ]
Zhang, Yongzheng [4 ]
Zhu, Yujia [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Natl Comp Network Emergency Response Tech Team Co, Beijing, Peoples R China
[4] China Assets Cybersecur Technol Co, Beijing, Peoples R China
关键词
Transferable adversarial traffic; Encrypted traffic classifiers; Adversarial example attack; Black-box attack; NETWORK; ROBUSTNESS;
D O I
10.1007/978-3-031-24386-8_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine learning algorithms have been widely leveraged in traffic classification tasks to overcome the challenges brought by the enormous encrypted traffic. On the contrary, ML-based classifiers introduce adversarial example attacks, which can fool the classifiers into giving wrong outputs with elaborately designed examples. Some adversarial attacks have been proposed to evaluate and improve the robustness of ML-based traffic classifiers. Unfortunately, it is impractical for these attacks to assume that the adversary can run the target classifiers locally (white-box). Even some GAN-based black-box attacks still require the target classifiers to act as discriminators. We fill the gap by proposing FAT (We use FAT rather than TAT to imporove readability.), a novel black-box adversarial traffic attack framework, which generates the transFerable Adversarial Traffic to evade ML-based encrypted traffic classifiers. The key novelty of FAT is two-fold: i) FAT does not assume that the adversary can obtain the target classifier. Specifically, FAT builds proxy classifiers to mimic the target classifiers and generates transferable adversarial traffic to misclassify the target classifiers. ii) FAT makes adversarial traffic attacks more practical by translating adversarial features into traffic. We use two datasets, CICIDS-2017 and MTA, to evaluate the effectiveness of FAT against seven common ML-based classifiers. The experimental results show that FAT achieves an average evasion detection rate (EDR) of 86.7%, which is higher than the state-of-the-art black-box attack by 34.4%.
引用
收藏
页码:153 / 173
页数:21
相关论文
共 50 条
  • [41] Toward practical defense against traffic analysis attacks on encrypted DNS traffic
    Niakanlahiji, Amirreza
    Orlowski, Soeren
    Vahid, Alireza
    Jafarian, J. Haadi
    COMPUTERS & SECURITY, 2023, 124
  • [42] Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model
    Zhou, Tianci
    Zeng, Yong
    Chen, Yitao
    Liu, Zhihong
    Ma, Jianfeng
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3768 - 3773
  • [43] ByteSGAN: A semi-supervised Generative Adversarial Network for encrypted traffic classification in SDN Edge Gateway
    Wang, Pan
    Wang, Zixuan
    Ye, Feng
    Chen, Xuejiao
    COMPUTER NETWORKS, 2021, 200
  • [44] BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs
    Wu, Tiru
    Xiao, Xi
    Li, Qing
    Liu, Qixu
    Hu, Guangwu
    Luo, Xiapu
    Jiang, Yong
    2023 20TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING, SECON, 2023,
  • [45] Efficiently Adapting Traffic Pre-trained Models for Encrypted Traffic Classification
    Lu, Wenxuan
    Lv, Zhuohang
    Yang, Lanqi
    Luo, Xiang
    Zang, Tianning
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2828 - 2833
  • [46] Improving traffic classifiers for active devices
    Puentes, F
    Carneiro, V
    2004 2ND IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS: COLLABORATIVE AUTOMATION - ONE KEY FOR INTELLIGENT INDUSTRIAL ENVIRONMENTS, 2004, : 298 - 302
  • [47] Features Optimization Techniques for Traffic Classifiers
    He, Jie
    Yang, Yuexiang
    Qiao, Yong
    Jiang, Kun
    Liu, Chaobin
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 588 - 591
  • [48] Classifying Service Flows in the Encrypted Skype Traffic
    Korczynski, Maciej
    Duda, Andrzej
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [49] Statistical identification of encrypted web browsing traffic
    Sun, QX
    Simon, DR
    Wang, YM
    Russell, W
    Padmanabhan, VN
    Qiu, L
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 19 - 30
  • [50] Generalization of Signatures for SSH Encrypted Traffic Identification
    Alshammari, Riyad
    Zincir-Heywood, A. Nur
    IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY, 2009, : 167 - 174