2021
DOI: 10.1155/2021/5578335
|View full text |Cite
|
Sign up to set email alerts
|

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Abstract: In recent years, machine learning has made tremendous progress in the fields of computer vision, natural language processing, and cybersecurity; however, we cannot ignore that machine learning models are vulnerable to adversarial examples, with some minor malicious input modifications, while appearing unmodified to human observers, the outputs of machine learning-based model can be misled easily. Likewise, attackers can bypass machine-learning-based security defenses model to attack systems in real time by gen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Some examples of defensive techniques are Adversarial Training, Ensemble Method, Data Deduplication, Secure Data Deduplication, Data Sensitization, Reject on Negative Impact (RONI), Identity Based Encryption, Defense Distillation, Differential Privacy, Blockchain Based Solution, Homomorphic Encryption, etc., (Chaudhary et al, 2020). Guo et al, (2021) also propose a black box attack method for models which detect anomaly network flow using machine learning algorithms. The proposed Black Box adversarial example generation method uses the White box attack on the substitute model.…”
Section: Machine Learning-based Approaches For Cyber Security Problemsmentioning
confidence: 99%
“…Some examples of defensive techniques are Adversarial Training, Ensemble Method, Data Deduplication, Secure Data Deduplication, Data Sensitization, Reject on Negative Impact (RONI), Identity Based Encryption, Defense Distillation, Differential Privacy, Blockchain Based Solution, Homomorphic Encryption, etc., (Chaudhary et al, 2020). Guo et al, (2021) also propose a black box attack method for models which detect anomaly network flow using machine learning algorithms. The proposed Black Box adversarial example generation method uses the White box attack on the substitute model.…”
Section: Machine Learning-based Approaches For Cyber Security Problemsmentioning
confidence: 99%
“…Next classification of attacks are black box and white box attacks [ 186 ]. In a black-box attack, the attacker has no knowledge of the target model’s architecture or characteristics, and his or her only competence is to feed the target model the data they want and watch the target model categorize the results [ 67 ]. On the other hand, in white box attacks model’s attributes are accessible to attackers [ 108 ].…”
Section: Adversarial Attacksmentioning
confidence: 99%
“…• Success rate improves up to 38.97% • Not suitable for obfuscated apps. • The experiment is only done on computer vision-based apps i.e., not widely acceptable Sensen Guo, et al, 2021 [ 67 ] Black Box ML proposes a machine learning based abnormal flow detector. The substitute model is trained with a comparable decision boundary and algorithm is used to create adversarial instances then examines if these examples can avoid the target models detection.…”
Section: Adversarial Attacksmentioning
confidence: 99%
“…Due to the correlation between diferent time scales, network trafc is scale-dependent [5]. Tis dependence is shown as follows: network trafc at diferent scales has diferent characteristics and laws, high-level scales have long-term laws, low-level scales have short-term laws, and high-level scale prediction needs to consider images of short-term laws [6]. Network trafc prediction needs to fully consider the complexity of network trafc.…”
Section: Introductionmentioning
confidence: 99%