Poisoning Network Flow Classifiers

4Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

As machine learning (ML) classifiers increasingly oversee the automated monitoring of network traffic, studying their resilience against adversarial attacks becomes critical. This paper focuses on poisoning attacks, specifically backdoor attacks, against network traffic flow classifiers. We investigate the challenging scenario of clean-label poisoning where the adversary's capabilities are constrained to tampering only with the training data - without the ability to arbitrarily modify the training labels or any other component of the training process. We describe a trigger crafting strategy that leverages model interpretability techniques to generate trigger patterns that are effective even at very low poisoning rates. Finally, we design novel strategies to generate stealthy triggers, including an approach based on generative Bayesian network models, with the goal of minimizing the conspicuousness of the trigger, and thus making detection of an ongoing poisoning campaign more challenging. Our findings provide significant insights into the feasibility of poisoning attacks on network traffic classifiers used in multiple scenarios, including detecting malicious communication and application classification.

Cite

CITATION STYLE

APA

Severi, G., Boboila, S., Oprea, A., Holodnak, J., Kratkiewicz, K., & Matterer, J. (2023). Poisoning Network Flow Classifiers. In ACM International Conference Proceeding Series (pp. 337–351). Association for Computing Machinery. https://doi.org/10.1145/3627106.3627123

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free