Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification (2310.06855v1)
Abstract: Federated learning enables multiple clients to collaboratively contribute to the learning of a global model orchestrated by a central server. This learning scheme promotes clients' data privacy and requires reduced communication overheads. In an application like network traffic classification, this helps hide the network vulnerabilities and weakness points. However, federated learning is susceptible to backdoor attacks, in which adversaries inject manipulated model updates into the global model. These updates inject a salient functionality in the global model that can be launched with specific input patterns. Nonetheless, the vulnerability of network traffic classification models based on federated learning to these attacks remains unexplored. In this paper, we propose GABAttack, a novel genetic algorithm-based backdoor attack against federated learning for network traffic classification. GABAttack utilizes a genetic algorithm to optimize the values and locations of backdoor trigger patterns, ensuring a better fit with the input and the model. This input-tailored dynamic attack is promising for improved attack evasiveness while being effective. Extensive experiments conducted over real-world network datasets validate the success of the proposed GABAttack in various situations while maintaining almost invisible activity. This research serves as an alarming call for network security experts and practitioners to develop robust defense measures against such attacks.
- W. Song, M. Beshley, K. Przystupa, H. Beshley, O. Kochan, A. Pryslupskyi, D. Pieniak, and J. Su, “A software deep packet inspection system for network traffic analysis and anomaly detection,” Sensors, vol. 20, no. 6, p. 1637, 2020.
- C.-T. Su and J.-H. Hsu, “An extended chi2 algorithm for discretization of real value attributes,” IEEE transactions on knowledge and data engineering, vol. 17, no. 3, pp. 437–441, 2005.
- R. Alshammari and A. N. Zincir-Heywood, “Identification of voip encrypted traffic using a machine learning approach,” Journal of King Saud University-Computer and Information Sciences, vol. 27, no. 1, pp. 77–92, 2015.
- W. Zhongsheng, W. Jianguo, Y. Sen, and G. Jiaqiong, “Retracted: Traffic identification and traffic analysis based on support vector machine,” Concurrency and Computation: Practice and Experience, vol. 32, no. 2, p. e5292, 2020.
- V. Mothukuri, R. M. Parizi, S. Pouriyeh, Y. Huang, A. Dehghantanha, and G. Srivastava, “A survey on security and privacy of federated learning,” Future Generation Computer Systems, vol. 115, pp. 619–640, 2021.
- S. Banabilah, M. Aloqaily, E. Alsayed, N. Malik, and Y. Jararweh, “Federated learning review: Fundamentals, enabling technologies, and future applications,” Information processing & management, vol. 59, no. 6, p. 103061, 2022.
- P. Kairouz, H. B. McMahan, B. Avent, A. Bellet, M. Bennis, A. N. Bhagoji, K. Bonawitz, Z. Charles, G. Cormode, R. Cummings et al., “Advances and open problems in federated learning,” Foundations and Trends® in Machine Learning, vol. 14, no. 1–2, pp. 1–210, 2021.
- H. Mun and Y. Lee, “Internet traffic classification with federated learning,” Electronics, vol. 10, no. 1, p. 27, 2020.
- Z. He, J. Yin, Y. Wang, G. Gui, B. Adebisi, T. Ohtsuki, H. Gacanin, and H. Sari, “Edge device identification based on federated learning and network traffic feature engineering,” IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 4, pp. 1898–1909, 2021.
- Y. Peng, M. He, and Y. Wang, “A federated semi-supervised learning approach for network traffic classification,” arXiv preprint arXiv:2107.03933, 2021.
- Y. Guo and D. Wang, “Feat: A federated approach for privacy-preserving network traffic classification in heterogeneous environments,” IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1274–1285, 2022.
- C. Sun, B. Chen, Y. Bu, and D. Zhang, “Traffic classification method based on federated semi-supervised learning,” in Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022, pp. 875–882.
- M. E. Ahmed and H. Kim, “Poster: Adversarial examples for classifiers in high-dimensional network data,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 2467–2469.
- M. Usama, J. Qadir, A. Al-Fuqaha, and M. Hamdi, “The adversarial machine learning conundrum: can the insecurity of ml become the achilles’ heel of cognitive networks?” IEEE Network, vol. 34, no. 1, pp. 196–203, 2019.
- R. Pang, H. Shen, X. Zhang, S. Ji, Y. Vorobeychik, X. Luo, A. Liu, and T. Wang, “A tale of evil twins: Adversarial inputs versus poisoned models,” in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, pp. 85–99.
- B. G. Doan, E. Abbasnejad, and D. C. Ranasinghe, “Februus: Input purification defense against trojan attacks on deep neural network systems,” in Annual Computer Security Applications Conference, 2020, pp. 897–912.
- Y. Liu, W.-C. Lee, G. Tao, S. Ma, Y. Aafer, and X. Zhang, “Abs: Scanning neural networks for back-doors by artificial brain stimulation,” in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 1265–1282.
- B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial intelligence and statistics. PMLR, 2017, pp. 1273–1282.
- Y. Chen, X. Qin, J. Wang, C. Yu, and W. Gao, “Fedhealth: A federated transfer learning framework for wearable healthcare,” IEEE Intelligent Systems, vol. 35, no. 4, pp. 83–93, 2020.
- X. Liang, Y. Liu, T. Chen, M. Liu, and Q. Yang, “Federated transfer reinforcement learning for autonomous driving,” arXiv preprint arXiv:1910.06001, 2019.
- M.-y. Zhu, Z. Chen, K.-f. Chen, N. Lv, and Y. Zhong, “Attention-based federated incremental learning for traffic classification in the internet of things,” Computer Communications, vol. 185, pp. 168–175, 2022.
- P. M. Sánchez Sánchez, A. Huertas Celdrán, J. R. Buendía Rubio, G. Bovet, and G. Martínez Pérez, “Robust federated learning for execution time-based device model identification under label-flipping attack,” Cluster Computing, pp. 1–12, 2023.
- G. Wang, T. Wang, H. Zheng, and B. Y. Zhao, “Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers,” in 23rd {normal-{\{{USENIX}normal-}\}} security symposium ({normal-{\{{USENIX}normal-}\}} security 14), 2014, pp. 239–254.
- S. Shen, S. Tople, and P. Saxena, “Auror: Defending against poisoning attacks in collaborative deep learning systems,” in Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016, pp. 508–519.
- C. Xie, K. Huang, P.-Y. Chen, and B. Li, “Dba: Distributed backdoor attacks against federated learning,” in International conference on learning representations, 2020.
- E. Bagdasaryan, A. Veit, Y. Hua, D. Estrin, and V. Shmatikov, “How to backdoor federated learning,” in International Conference on Artificial Intelligence and Statistics. PMLR, 2020, pp. 2938–2948.
- H. Wang, K. Sreenivasan, S. Rajput, H. Vishwakarma, S. Agarwal, J.-y. Sohn, K. Lee, and D. Papailiopoulos, “Attack of the tails: Yes, you really can backdoor federated learning,” Advances in Neural Information Processing Systems, vol. 33, pp. 16 070–16 084, 2020.
- G. Verma, E. Ciftcioglu, R. Sheatsley, K. Chan, and L. Scott, “Network traffic obfuscation: An adversarial machine learning approach,” in MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM). IEEE, 2018, pp. 1–6.
- N. Carlini and D. Wagner, “Towards evaluating the robustness of neural networks,” in 2017 ieee symposium on security and privacy (sp). Ieee, 2017, pp. 39–57.
- M. Usama, J. Qadir, and A. Al-Fuqaha, “Adversarial attacks on cognitive self-organizing networks: The challenge and the way forward,” in 2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops). IEEE, 2018, pp. 90–97.
- M. Usama, A. Qayyum, J. Qadir, and A. Al-Fuqaha, “Black-box adversarial machine learning attack on network traffic classification,” in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, 2019, pp. 84–89.
- Mahmoud Nazzal (11 papers)
- Nura Aljaafari (5 papers)
- Ahmed Sawalmeh (1 paper)
- Abdallah Khreishah (37 papers)
- Muhammad Anan (3 papers)
- Abdulelah Algosaibi (3 papers)
- Mohammed Alnaeem (1 paper)
- Adel Aldalbahi (2 papers)
- Abdulaziz Alhumam (2 papers)
- Conrado P. Vizcarra (1 paper)
- Shadan Alhamed (1 paper)