2022
DOI: 10.1109/tifs.2022.3201377
|View full text |Cite
|
Sign up to set email alerts
|

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…In fact, it is difficult for attackers to obtain detection algorithms for white-box attacks. In 2022, Sharon et al [8] proposed TANTRA, an adversarial network traffic remolding attack that is based on end-to-end timing. An LSTM deep neural network is used, which is trained to learn the time difference between the benign packets of the target network.…”
Section: Adversarial Malicious Encrypted Traffic Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, it is difficult for attackers to obtain detection algorithms for white-box attacks. In 2022, Sharon et al [8] proposed TANTRA, an adversarial network traffic remolding attack that is based on end-to-end timing. An LSTM deep neural network is used, which is trained to learn the time difference between the benign packets of the target network.…”
Section: Adversarial Malicious Encrypted Traffic Researchmentioning
confidence: 99%
“…When an attacker discovers that malicious encrypted traffic can also be detected, they may create additional malicious encrypted traffic. With the upgrading of attacks and defense confrontation, more and more attackers will generate adversarial samples to bypass the current mainstream detection methods [8]. Even some minor changes will seriously affect the accuracy of the detection method [9].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, several studies [ 6 , 7 , 8 , 9 , 10 , 11 ] were introduced to investigate the impact of AML techniques on ML-based IDSs. These works considered AML attack strategies, defense strategies, or both for the sake of robustness enhancement.…”
Section: Introductionmentioning
confidence: 99%
“…However, the fixed data samples cannot be used to study a dynamic case. Meanwhile, adversarial attacks challenge the robustness of DL-based NIDS [11], and researchers need to perturb the behavior of network traffic. Therefore, each data sample needs an interface to be modified.…”
Section: Introductionmentioning
confidence: 99%