|国家科技期刊平台
首页|期刊导航|通信学报|基于后门攻击的恶意流量逃逸方法

基于后门攻击的恶意流量逃逸方法OA北大核心CSTPCD

Escape method of malicious traffic based on backdoor attack

中文摘要英文摘要

针对基于深度学习模型的流量分类器,提出了一种利用后门攻击实现恶意流量逃逸的方法.通过在训练过程添加毒化数据将后门植入模型,后门模型将带有后门触发器的恶意流量判定为良性,从而实现恶意流量逃逸;同时对不含触发器的干净流量正常判定,保证了模型后门的隐蔽性.采用多种触发器分别生成不同后门模型,比较了多种恶意流量对不同后门模型的逃逸效果,同时分析了不同后门对模型性能的影响.实验验证了所提方法的有效性,为恶意流量逃逸提供了新的思路.

Launching backdoor attacks against deep learning(DL)-based network traffic classifiers,and a method of ma-licious traffic escape was proposed based on the backdoor attack.Backdoors were embedded in classifiers by mixing poi-soned training samples with clean samples during the training process.These backdoor classifiers then identified the ma-licious traffic with an attacker-specific backdoor trigger as benign,allowing the malicious traffic to escape.Additionally,backdoor classifiers behaved normally on clean samples,ensuring the backdoor's concealment.Different backdoor trig-gers were adopted to generate various backdoor models,the effects of different malicious traffic on different backdoor models were compared,and the influence of different backdoors on the model's performance was analyzed.The effective-ness of the proposed method was verified through experiments,providing a new approach for escaping malicious traffic from classifiers.

马博文;郭渊博;马骏;张琦;方晨

信息工程大学密码工程学院,河南 郑州 450001

计算机与自动化

后门攻击恶意流量逃逸深度学习网络流量分类

backdoor attackescape of malicious trafficdeep learningnetwork traffic classification

《通信学报》 2024 (004)

73-83 / 11

国家自然科学基金资助项目(No.62276091);国家社会科学基金资助项目(No.2022-SKJJ-B-057)The National Natural Science Foundation of China(No.62276091),The National Social Science Fund of China(No.2022-SKJJ-B-057)

10.11959/j.issn.1000-436x.2024077

评论