TY - JOUR
T1 - Behavior Intent Modeling of Network Traffic Adversarial Examples for Defense
AU - Luo, Senlin
AU - Shao, Siyuan
AU - Zhao, Zhiyang
AU - Li, Xinshuai
AU - Pan, Limin
AU - Liu, Zheng
N1 - Publisher Copyright:
© 2025, Beijing Institute of Technology. All rights reserved.
PY - 2025
Y1 - 2025
N2 - Adversarial example is one of the main attack methods against deep learning models, and models with adversarial defense capabilities suffer from degraded prediction performance on normal samples or even signific-ant accuracy drops, making practical deployment challenging. Input preprocessing methods, while removing ad-versarial perturbations, lack semantic constraints and tend to alter key classification features (e.g., packet rates), impairing the classification performance of normal samples in network intrusion detection. Threshold-based methods, which rely on one-dimensional separation boundaries, cannot distinguish samples with similar feature values, substantially reducing defense effectiveness. This method employs Kolmogorov-Arnold Networks (KAN) to infer semantic representations of behavioral intent and integrates a diffusion process with a condition-al autoencoder to selectively remove adversarial perturbations while preserving key discriminative features under semantic guidance. Experiments on multiple real-world datasets show that the method achieves an accuracy increase of over 13% without affecting the model’s original prediction performance, effectively defends against major adversarial attacks and offers substantial practical value.
AB - Adversarial example is one of the main attack methods against deep learning models, and models with adversarial defense capabilities suffer from degraded prediction performance on normal samples or even signific-ant accuracy drops, making practical deployment challenging. Input preprocessing methods, while removing ad-versarial perturbations, lack semantic constraints and tend to alter key classification features (e.g., packet rates), impairing the classification performance of normal samples in network intrusion detection. Threshold-based methods, which rely on one-dimensional separation boundaries, cannot distinguish samples with similar feature values, substantially reducing defense effectiveness. This method employs Kolmogorov-Arnold Networks (KAN) to infer semantic representations of behavioral intent and integrates a diffusion process with a condition-al autoencoder to selectively remove adversarial perturbations while preserving key discriminative features under semantic guidance. Experiments on multiple real-world datasets show that the method achieves an accuracy increase of over 13% without affecting the model’s original prediction performance, effectively defends against major adversarial attacks and offers substantial practical value.
KW - adversarial example defense
KW - KAN model
KW - network intrusion detection
KW - semantic reasoning
UR - https://www.scopus.com/pages/publications/105021028385
U2 - 10.15918/j.tbit1001-0645.2025.059
DO - 10.15918/j.tbit1001-0645.2025.059
M3 - Article
AN - SCOPUS:105021028385
SN - 1001-0645
VL - 45
SP - 1194
EP - 1203
JO - Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
JF - Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
IS - 11
ER -