Self-Taught Black-Box Adversarial Attack to Multilayer Network Automation.

Xiaoqin Pan,Zuqing Zhu
DOI: https://doi.org/10.1109/globecom48099.2022.10000984
2022-01-01
Abstract:Although the idea of multilayer network automation (MLy-NA) has gained its initial success due to the advances on software-defined networking (SDN) and machine learning (ML), the security vulnerabilities brought by the reduction of human intervention in network operation should not be ignored. In this work, we study how to mislead the ML-based classifiers for anomaly detection in MLy - NA of packet-over-optical networks, and propose a self-taught black-box adversarial attack (BB-AdA) scheme. Specifically, we design novel algorithms to synthesize and label training data for the substitute classifier used by the BB-AdA. The algorithms not only generate synthetic data to cover all the anomaly types based on a small set of legitimate telemetry data only containing the “Normal” type, but also label the data with minimized queries to the target classifier in MLy-NA. Extensive simulations are conducted with the telemetry data collected from a real-world packet-over-optical network testbed. The results show that with our self-taught BB-AdA, an attacker can interact with an MLy-NA system quietly and efficiently to train itself adaptively, generate well-crafted adversarial samples to mislead the target classifiers in different ML architectures and severely affect their performance on anomaly detection, and disturb the operation of MLy-NA in the hard-to-detect manner.
What problem does this paper attempt to address?