高级检索

    潘一鸣, 林家骏. 基于生成对抗网络的恶意网络流生成及验证[J]. 华东理工大学学报(自然科学版), 2019, 45(2): 344-350. DOI: 10.14135/j.cnki.1006-3080.20180313003
    引用本文: 潘一鸣, 林家骏. 基于生成对抗网络的恶意网络流生成及验证[J]. 华东理工大学学报(自然科学版), 2019, 45(2): 344-350. DOI: 10.14135/j.cnki.1006-3080.20180313003
    PAN Yiming, LIN Jiajun. Generation and Verification of Malicious Network Flow Based on Generative Adversarial Networks[J]. Journal of East China University of Science and Technology, 2019, 45(2): 344-350. DOI: 10.14135/j.cnki.1006-3080.20180313003
    Citation: PAN Yiming, LIN Jiajun. Generation and Verification of Malicious Network Flow Based on Generative Adversarial Networks[J]. Journal of East China University of Science and Technology, 2019, 45(2): 344-350. DOI: 10.14135/j.cnki.1006-3080.20180313003

    基于生成对抗网络的恶意网络流生成及验证

    Generation and Verification of Malicious Network Flow Based on Generative Adversarial Networks

    • 摘要: 针对基于深度学习的分类器面对对抗样本时缺乏稳定性的问题,基于生成对抗网络(GAN)提出了一种新的模型,用于生成对抗样本。该模型首次实现了直接以恶意网络流为原始样本的对抗样本生成,并首次提出了弱相关位的概念,用于保证恶意网络流对抗样本的可执行性和攻击性。利用该模型生成的对抗样本能够有效地欺骗基于深度学习的网络安全检测器,且通过实验验证了该对抗样本具有实际攻击效果。

       

      Abstract: As deep learning shows great performance for large samples, more and more network security products use deep learning based algorithms to improve the detection performance. However, recent studies have found that deep learning based classifier may have poor stability when confronting adversarial samples. This problem has attracted many attentions and some related research results have been reported. In this paper, a new model based on generative adversarial nets (GAN) is proposed to generate adversarial samples. The proposed model is composed of three modules: generative module, discriminative module, and authentication module. The generative module is responsible for generating new malicious network flow adversarial samples. These adversarial examples are constrained by weakly related bits to guarantee the executability and offensiveness. The discriminative module detects the target via a large number of samples, by which a high-dimensional neural network is constructed to fit the target detector. Its aims is to implement the deception of the black box target detector using adversarial samples. The authentication module includes Snort and target detector, which may be utilized to verify the validity of the adversarial samples by comparing the detection results. The three modules will cooperate with each other to implement the executability and offensiveness protection on malicious network flow samples, and achieve the entire process of generating adversarial samples for deceiving target detector. The main contribution of this work includes: the proposed model can generates adversarial samples via malicious network flow; the weakly related bits are proposed to ensure the executability and offensiveness of malicious network flows adversarial samples; the adversarial samples generated by this model can effectively deceive the deep learning based network security detector. Finally, experiment results show that the adversarial samples can attain actual attack effect.

       

    /

    返回文章
    返回