Show simple item record

dc.contributor.authorSeveri, Giorgio
dc.contributor.authorBoboila, Simona
dc.contributor.authorOprea, Alina
dc.contributor.authorHolodnak, John
dc.contributor.authorKratkiewicz, Kendra
dc.contributor.authorMatterer, Jason
dc.date.accessioned2024-01-10T18:18:44Z
dc.date.available2024-01-10T18:18:44Z
dc.date.issued2023-12-04
dc.identifier.isbn979-8-4007-0886-2
dc.identifier.urihttps://hdl.handle.net/1721.1/153298
dc.description.abstractAs machine learning (ML) classifiers increasingly oversee the automated monitoring of network traffic, studying their resilience against adversarial attacks becomes critical. This paper focuses on poisoning attacks, specifically backdoor attacks, against network traffic flow classifiers. We investigate the challenging scenario of clean-label poisoning where the adversary’s capabilities are constrained to tampering only with the training data — without the ability to arbitrarily modify the training labels or any other component of the training process. We describe a trigger crafting strategy that leverages model interpretability techniques to generate trigger patterns that are effective even at very low poisoning rates. Finally, we design novel strategies to generate stealthy triggers, including an approach based on generative Bayesian network models, with the goal of minimizing the conspicuousness of the trigger, and thus making detection of an ongoing poisoning campaign more challenging. Our findings provide significant insights into the feasibility of poisoning attacks on network traffic classifiers used in multiple scenarios, including detecting malicious communication and application classification.en_US
dc.publisherACM|Annual Computer Security Applications Conferenceen_US
dc.relation.isversionofhttps://doi.org/10.1145/3627106.3627123en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titlePoisoning Network Flow Classifiersen_US
dc.typeArticleen_US
dc.identifier.citationSeveri, Giorgio, Boboila, Simona, Oprea, Alina, Holodnak, John, Kratkiewicz, Kendra et al. 2023. "Poisoning Network Flow Classifiers."
dc.contributor.departmentLincoln Laboratory
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2024-01-01T08:51:16Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2024-01-01T08:51:17Z
mit.licensePUBLISHER_POLICY
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record