2021
DOI: 10.48550/arxiv.2103.06297
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Abstract: Network intrusion attacks are a known threat. To detect such attacks, network intrusion detection systems (NIDSs) have been developed and deployed. These systems apply machine learning models to high-dimensional vectors of features extracted from network traffic to detect intrusions. Advances in NIDSs have made it challenging for attackers, who must execute attacks without being detected by these systems. Prior research on bypassing NIDSs has mainly focused on perturbing the features extracted from the attack … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Sharon et al [49] presented TANTRA, a timing-based adversarial network traffic reshaping attack that reshapes malicious traffic using timestamp attributes in order to evade detection without affecting the packet's content. The approach was assessed using the Kitsune and CIC-IDS2017 datasets over the KitNET, an advanced NIDS, Autoencoder, Isolation Forest, and achieved a success rate of 99.99%.…”
Section: A Generation Of Aes To Attack Ml-based Nids Modelsmentioning
confidence: 99%
“…Sharon et al [49] presented TANTRA, a timing-based adversarial network traffic reshaping attack that reshapes malicious traffic using timestamp attributes in order to evade detection without affecting the packet's content. The approach was assessed using the Kitsune and CIC-IDS2017 datasets over the KitNET, an advanced NIDS, Autoencoder, Isolation Forest, and achieved a success rate of 99.99%.…”
Section: A Generation Of Aes To Attack Ml-based Nids Modelsmentioning
confidence: 99%
“…Bots trying to contact their C2 server can generate URLs that appear legitimate to humans [175], or that can evade malicious-URL detectors [208]. To evade traffic-based NIDSs, adversaries can shape their traffic [85,166] or change their timing to hide it [200].…”
Section: Evading Nids (Network Intrusion Detection Systems)mentioning
confidence: 99%