Please wait a minute...
Computer & Telecommunication  2021, Vol. 1 Issue (5): 46-51    DOI:
Current Issue | Archive | Adv Search |
A Black Box Attack on a Network Traffic Intrusion Detection System
Gansu University of Political Science and Law
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  
The network traffic detection system based on machine learning is a hot research direction in the field of network security at this stage, but at the same time, the network traffic detection system has been greatly challenged. The generation of attack samples reduces the detection performance of the detection system for malicious traffic. This article uses the generative adversarial network to generate adversarial samples, by adding noise interference to the original malicious traffic, so that non-directional disturbances that do not affect the characteristics of the original traffic are added to the attack characteristics to realize the judgment of the jamming detection model, thereby avoiding the characteristics detection and reducing the accuracy of traffic detection by 83.4%. It provides a richer training sample for the intrusion detection model to improve its robustness.
Key wordsnetwork traffic      intrusion detection      adversarial sample generation      generative adversarial network     
Published: 25 August 2021

Cite this article:

FU Sen HE Zhen-xiang. A Black Box Attack on a Network Traffic Intrusion Detection System. Computer & Telecommunication, 2021, 1(5): 46-51.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2021/V1/I5/46

[1] HUANG Qing-lan. Intrusion Detection Method Based on Cluster Analysis and Transfer Learning[J]. 电脑与电信, 2021, 1(3): 13-15.
[2] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[3] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[4] ZHANG Gang , CHEN Jia-lian, SONG Jian, GUO Jun-qi, ZHOU Chen-rui. Chinese Landscape Painting Automated Generation Model Based on Generative Adversarial Networks[J]. 电脑与电信, 2020, 1(3): 1-.
[5] HOU Yan. Research and Design of the Network Security Model in Cloud Environment[J]. 电脑与电信, 2020, 1(12): 69-71.
[6] LIU Xiao-xiao. Analysis of Abnormal Traffic Identification Technology Based on Network Protocol[J]. 电脑与电信, 2017, 1(12): 56-58.
[7] Liao Haiyan. Wireless Campus Network Planning[J]. 电脑与电信, 2016, 1(1-2): 65-68.
[8] Chen Huangwei . E-government Information Security Technology Briefly Reviewed[J]. , 2011, 1(05): 0-0.
[9] Jia Hongwei Ge Yongliang chen Ming. The Bloom Filter Algorithm Based on the Information Security of Risk Assessment [J]. , 2011, 1(01): 0-0.
[10] Yang Xiuwen  Mu Pengzhi. Research for Typical Attack Methods and Security Policies in Ad Hoc Network[J]. , 2010, 1(03): 43-45.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd