2020
DOI: 10.1109/access.2020.3007577
|View full text |Cite
|
Sign up to set email alerts
|

GAN Tunnel: Network Traffic Steganography by Using GANs to Counter Internet Traffic Classifiers

Abstract: In this paper, we introduce a novel traffic masking method, called Generative Adversarial Network (GAN) tunnel, to protect the identity of applications that generate network traffic from classification by adversarial Internet traffic classifiers (ITCs). Such ITCs have been used in the past for website fingerprinting and detection of network protocols. Their use is becoming more ubiquitous than before for inferring user information. ITCs based on machine learning can identify user applications by analyzing the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 34 publications
(60 reference statements)
0
6
0
Order By: Relevance
“…In [6], an instruction masking method called Generative Adversarial Network (GAN) is proposed to secure the conventional instructions and traffic information generated by the system from being copied and tampered with in the power system. The GAN tunnel proposed in the article generates instructions that simulate real power allocation operations and encapsulates the actual system instructions in the simulated instructions generated by GAN.…”
Section: Related Workmentioning
confidence: 99%
“…In [6], an instruction masking method called Generative Adversarial Network (GAN) is proposed to secure the conventional instructions and traffic information generated by the system from being copied and tampered with in the power system. The GAN tunnel proposed in the article generates instructions that simulate real power allocation operations and encapsulates the actual system instructions in the simulated instructions generated by GAN.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, the hidden malware was detected by some other anti-virus scanners. Another malware steganography attach was presented by [ 29 ]. In the proposed steganography system, the identity of the malware was hidden by generating fake network traffic, which mimics benign application traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This section highlights different steganography techniques presented in the literature [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28]. Tab.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, the attacker output text file is restricted to 23 kB. Another network steganography application was proposed by [26], which implemented a masking technique to conceal the malware application identity. In the proposed scheme, the tunnel generates fake traffic that simulates normal network traffic encapsulating the actual malicious traffic.…”
Section: Literature Reviewmentioning
confidence: 99%