Affiliation:
1. School of Cybersecurity, Northwestern Polytechnical University, Xi’an, Shaanxi 710072, China
Abstract
In recent years, machine learning has made tremendous progress in the fields of computer vision, natural language processing, and cybersecurity; however, we cannot ignore that machine learning models are vulnerable to adversarial examples, with some minor malicious input modifications, while appearing unmodified to human observers, the outputs of machine learning-based model can be misled easily. Likewise, attackers can bypass machine-learning-based security defenses model to attack systems in real time by generating adversarial examples. In this paper, we propose a black-box attack method against machine-learning-based anomaly network flow detection algorithms. Our attack strategy consists in training another model to substitute for the target machine learning model. Based on the overall understanding of the substitute model and the migration of the adversarial examples, we use the substitute model to craft adversarial examples. The experiment has shown that our method can attack the target model effectively. We attack several kinds of network flow detection models, which are based on different kinds of machine learning methods, and we find that the adversarial examples crafted by our method can bypass the detection of the target model with high probability.
Funder
National Key R&D Program of China
Subject
Computer Networks and Communications,Information Systems
Reference33 articles.
1. An introductory survey on attention mechanisms in NLP problems;D. Hu
2. Machine learning for internet of things data analysis: a survey
3. An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT;J. Xiong;IEEE Transactions on Industrial Informatics,2019
4. A survey on semi-, self-and unsupervised techniques in image classification;L. Schmarje,2020
5. Popularity prediction on vacation rental websites;Y. Li;Neurocomputing,2020
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献