Behavior Intent Modeling of Network Traffic Adversarial Examples for Defense

  • Senlin Luo
  • , Siyuan Shao
  • , Zhiyang Zhao
  • , Xinshuai Li
  • , Limin Pan
  • , Zheng Liu*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Adversarial example is one of the main attack methods against deep learning models, and models with adversarial defense capabilities suffer from degraded prediction performance on normal samples or even signific-ant accuracy drops, making practical deployment challenging. Input preprocessing methods, while removing ad-versarial perturbations, lack semantic constraints and tend to alter key classification features (e.g., packet rates), impairing the classification performance of normal samples in network intrusion detection. Threshold-based methods, which rely on one-dimensional separation boundaries, cannot distinguish samples with similar feature values, substantially reducing defense effectiveness. This method employs Kolmogorov-Arnold Networks (KAN) to infer semantic representations of behavioral intent and integrates a diffusion process with a condition-al autoencoder to selectively remove adversarial perturbations while preserving key discriminative features under semantic guidance. Experiments on multiple real-world datasets show that the method achieves an accuracy increase of over 13% without affecting the model’s original prediction performance, effectively defends against major adversarial attacks and offers substantial practical value.

Translated title of the contribution网络流量对抗样本行为意图建模防御方法研究
Original languageEnglish
Pages (from-to)1194-1203
Number of pages10
JournalBeijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
Volume45
Issue number11
DOIs
Publication statusPublished - 2025

Keywords

  • adversarial example defense
  • KAN model
  • network intrusion detection
  • semantic reasoning

Fingerprint

Dive into the research topics of 'Behavior Intent Modeling of Network Traffic Adversarial Examples for Defense'. Together they form a unique fingerprint.

Cite this