Linghao Li, Yan Zhu, Yun Li, Wei Qiao, Zelin Cui, Susu Cui, Bo Jiang, Zhigang Lu
{"title":"对DoH隧道检测系统的有效黑盒攻击","authors":"Linghao Li, Yan Zhu, Yun Li, Wei Qiao, Zelin Cui, Susu Cui, Bo Jiang, Zhigang Lu","doi":"10.1016/j.comnet.2025.111524","DOIUrl":null,"url":null,"abstract":"<div><div>The introduction of DNS-over-HTTPS (DoH) aims to mitigate the security vulnerabilities of traditional DNS. However, attackers have begun exploiting DoH to establish tunnels for malicious activities. Machine learning (ML)-based network intrusion detection systems (NIDSs) have emerged as a promising approach for detecting DoH tunnel attacks. Paradoxically, these ML models are susceptible to adversarial machine learning attacks. A growing number of researchers are investigating adversarial techniques to circumvent NIDS, yet they neglect the real-world viability of implementing these attack strategies under specific network constraints. To address this gap, we propose a black-box attack framework leveraging the transferability of adversarial samples, along with an adversarial sample generation algorithm called Strategic Feature-Adaptive Adversarial Attack (SFAA) which serves as the black-box attack framework’s core component. SFAA incorporates feature correlations and feature importance to optimize the perturbation direction, thereby generating more realistic adversarial samples. In the context of DoH intrusion attacks, we employ our proposed black-box attack framework to carry out adversarial attacks on commonly used and highly effective ML models. Our experimental results demonstrate that the proposed black-box attack framework effectively evades ML models, and adversarial samples generated by SFAA achieve an attack success rate (ASR) of 63.26%, surpassing state-of-the-art adversarial attacks, including the Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Projected Gradient Descent (PGD), DeepFool, Carlini & Wagner (C&W), and Jacobian Saliency Map Attack (JSMA). Moreover, we propose a defense framework combining adversarial training and confidence-driven secondary classification, providing a novel paradigm for the robust design of machine learning models to mitigate adversarial attacks.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"270 ","pages":"Article 111524"},"PeriodicalIF":4.4000,"publicationDate":"2025-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards effective black-box attacks on DoH tunnel detection systems\",\"authors\":\"Linghao Li, Yan Zhu, Yun Li, Wei Qiao, Zelin Cui, Susu Cui, Bo Jiang, Zhigang Lu\",\"doi\":\"10.1016/j.comnet.2025.111524\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The introduction of DNS-over-HTTPS (DoH) aims to mitigate the security vulnerabilities of traditional DNS. However, attackers have begun exploiting DoH to establish tunnels for malicious activities. Machine learning (ML)-based network intrusion detection systems (NIDSs) have emerged as a promising approach for detecting DoH tunnel attacks. Paradoxically, these ML models are susceptible to adversarial machine learning attacks. A growing number of researchers are investigating adversarial techniques to circumvent NIDS, yet they neglect the real-world viability of implementing these attack strategies under specific network constraints. To address this gap, we propose a black-box attack framework leveraging the transferability of adversarial samples, along with an adversarial sample generation algorithm called Strategic Feature-Adaptive Adversarial Attack (SFAA) which serves as the black-box attack framework’s core component. SFAA incorporates feature correlations and feature importance to optimize the perturbation direction, thereby generating more realistic adversarial samples. In the context of DoH intrusion attacks, we employ our proposed black-box attack framework to carry out adversarial attacks on commonly used and highly effective ML models. Our experimental results demonstrate that the proposed black-box attack framework effectively evades ML models, and adversarial samples generated by SFAA achieve an attack success rate (ASR) of 63.26%, surpassing state-of-the-art adversarial attacks, including the Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Projected Gradient Descent (PGD), DeepFool, Carlini & Wagner (C&W), and Jacobian Saliency Map Attack (JSMA). Moreover, we propose a defense framework combining adversarial training and confidence-driven secondary classification, providing a novel paradigm for the robust design of machine learning models to mitigate adversarial attacks.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"270 \",\"pages\":\"Article 111524\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-07-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625004918\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004918","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Towards effective black-box attacks on DoH tunnel detection systems
The introduction of DNS-over-HTTPS (DoH) aims to mitigate the security vulnerabilities of traditional DNS. However, attackers have begun exploiting DoH to establish tunnels for malicious activities. Machine learning (ML)-based network intrusion detection systems (NIDSs) have emerged as a promising approach for detecting DoH tunnel attacks. Paradoxically, these ML models are susceptible to adversarial machine learning attacks. A growing number of researchers are investigating adversarial techniques to circumvent NIDS, yet they neglect the real-world viability of implementing these attack strategies under specific network constraints. To address this gap, we propose a black-box attack framework leveraging the transferability of adversarial samples, along with an adversarial sample generation algorithm called Strategic Feature-Adaptive Adversarial Attack (SFAA) which serves as the black-box attack framework’s core component. SFAA incorporates feature correlations and feature importance to optimize the perturbation direction, thereby generating more realistic adversarial samples. In the context of DoH intrusion attacks, we employ our proposed black-box attack framework to carry out adversarial attacks on commonly used and highly effective ML models. Our experimental results demonstrate that the proposed black-box attack framework effectively evades ML models, and adversarial samples generated by SFAA achieve an attack success rate (ASR) of 63.26%, surpassing state-of-the-art adversarial attacks, including the Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Projected Gradient Descent (PGD), DeepFool, Carlini & Wagner (C&W), and Jacobian Saliency Map Attack (JSMA). Moreover, we propose a defense framework combining adversarial training and confidence-driven secondary classification, providing a novel paradigm for the robust design of machine learning models to mitigate adversarial attacks.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.