Research Article

A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification

Table 8

Untargeted defense on LeNet-5 and transferability on Vgg-16.

Methods of crafting perturbationTraffic application classDeceiving rate on LeNet-5L2 normL0 normSSIMTime consuming
(second)
Transferability deceiving rate on Vgg-16

L-BFGSGeodo6.40%8.31%73.28%74.86%1331.25%
Neris53.60%2.58%65.20%91.04%1362.31%
Virut46.00%2.71%68.96%93.72%1360.87%
Cridex0.20%5.00%81.00%86.53%15100.00%
Average26.55%4.65%72.11%86.54%1463.61%

FGSMGeodo100.00%10.83%51.24%38.28%238.28%
Neris90.20%8.79%60.45%54.64%298.00%
Virut95.40%7.74%70.86%77.97%258.91%
Cridex90.80%8.26%76.53%76.33%244.05%
Average94.10%8.91%64.77%61.81%259.81%

C&WGeodo100.00%1.00%50.00%99.59%1510.00%
Neris100.00%1.00%42.00%99.99%890.40%
Virut100.00%1.00%58.00%99.98%1101.20%
Cridex100.00%1.00%75.00%99.88%1340.20%
Average100.00%1.00%56.25%99.86%1210.45%

JASMGeodo99.80%11.38%4.52%63.30%13561.12%
Neris96.40%10.12%5.36%65.20%13762.24%
Virut86.20%8.91%5.86%71.04%13536.19%
Cridex99.80%7.89%5.26%72.98%13631.66%
Average95.55%9.56%5.25%68.10%13647.80%