通信学报 ›› 2020, Vol. 41 ›› Issue (9): 59-70.doi: 10.11959/j.issn.1000-436x.2020166

• 学术论文 • 上一篇    下一篇

基于对抗样本的网络欺骗流量生成方法

胡永进1,郭渊博1,马骏1,张晗1,2(),毛秀青1   

  1. 1 信息工程大学密码工程学院,河南 郑州 450001
    2 郑州大学软件学院,河南 郑州 450000
  • 修回日期:2020-06-16 出版日期:2020-09-25 发布日期:2020-10-12
  • 作者简介:胡永进(1981- ),男,山东潍坊人,信息工程大学讲师,主要研究方向为主动防御、态势感知|郭渊博(1975- ),男,陕西周至人,博士,信息工程大学教授、博士生导师,主要研究方向为大数据安全、态势感知|马骏(1981- ),男,山西阳泉人,博士,信息工程大学副教授,主要研究方向为态势感知与威胁发现|张晗(1985- ),女,河南项城人,信息工程大学博士生,主要研究方向为自然语言处理、信息安全|毛秀青(1980- ),男,安徽滁州人,信息工程大学副教授,主要研究方向为人工智能安全
  • 基金资助:
    信息保障技术重点实验室开放基金资助项目(KJ-15-108)

Method to generate cyber deception traffic based on adversarial sample

Yongjin HU1,Yuanbo GUO1,Jun MA1,Han ZHANG1,2(),Xiuqing MAO1   

  1. 1 Department of Cryptogram Engineering,Information Engineering University,Zhengzhou 450001,China
    2 Software College,Zhengzhou University,Zhengzhou 450000,China
  • Revised:2020-06-16 Online:2020-09-25 Published:2020-10-12
  • Supported by:
    Foundation of Science and Technology on Information Assurance Laboratory(KJ-15-108)

摘要:

为了应对流量分类攻击,从防御者的角度出发,提出了一种基于对抗样本的网络欺骗流量生成方法。通过在正常的网络流量中增加扰动,形成欺骗流量的对抗样本,使攻击者在实施以深度学习模型为基础的流量分类攻击时出现分类错误,欺骗攻击者从而导致攻击失败,并造成攻击者时间和精力的消耗。采用几种不同的扰动生成方法形成网络流量对抗样本,选择LeNet-5深度卷积神经网络作为攻击者使用的流量分类模型实施欺骗,通过实验验证了所提方法的有效性,为流量混淆和欺骗提供了新的方法。

关键词: 对抗样本, 网络流量分类, 网络欺骗, 网络流量混淆, 深度学习

Abstract:

In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.

Key words: adversarial sample, network traffic classification, cyber deception, network traffic obfuscation, deep learning

中图分类号: 

No Suggested Reading articles found!