V-PSC: A Perturbation-Based Causative Attack Against DL Classifiers' Supply Chain in VANET

DL Based classifiers can attain a higher accuracy with less storage requirement, which suits perfectly with the VANET. However, it has been proved that DL models suffer from crafted perturbation data, a small amount of such can misguide the classifier, thus backdoors can be created for malicious reasons. This paper studies such a causative attack in the VANET. We present a perturbation-based causative attack which targets at the supply chain of DL classifiers in the VANET. We first train a classifier using VANET simulated data which meets the standard accuracy for identifying malicious traffic in the VANET. Then, we elaborate on the effectiveness of our presented attack scheme on this pre-trained classifier. We also explore some feasible approaches to ease the outcome brought by our attack. Experimental results show that the scheme can cause the target DL model a 10.52% drop in accuracy.

[1]  Pan Wang,et al.  Datanet: Deep Learning Based Encrypted Network Traffic Classification in SDN Home Gateway , 2018, IEEE Access.

[2]  Luca Rigazio,et al.  Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.

[3]  Mianxiong Dong,et al.  DeepNFV: A Lightweight Framework for Intelligent Edge Network Functions Virtualization , 2018, IEEE Network.

[4]  Yiran Chen,et al.  Generative Poisoning Attack Method Against Neural Networks , 2017, ArXiv.

[5]  Meikang Qiu,et al.  A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT , 2021, IEEE Transactions on Cloud Computing.

[6]  Vasiliy Krundyshev,et al.  Synthetic datasets generation for intrusion detection in VANET , 2018, SIN.

[7]  Daniel Gibert Llauradó Convolutional neural networks for malware classification , 2016 .

[8]  Meikang Qiu,et al.  Senior2Local: A Machine Learning Based Intrusion Detection Method for VANETs , 2018, SmartCom.

[9]  Kouichi Sakurai,et al.  One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.

[10]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[11]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..

[12]  Pan He,et al.  Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[13]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[14]  Yi Zeng,et al.  $Deep-Full-Range$ : A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework , 2019, IEEE Access.

[15]  Zhihui Lu,et al.  An efficient key distribution system for data fusion in V2X heterogeneous networks , 2019, Inf. Fusion.

[16]  Brendan Dolan-Gavitt,et al.  BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.

[17]  Jalel Ben-Othman,et al.  Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks , 2014, 2014 IEEE Global Communications Conference.