Skip to main content
Log in

Intelligent networking in adversarial environment: challenges and opportunities

  • Research Paper
  • Special Focus on Cyber Security in the Era of Artificial Intelligence
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Although deep learning technologies have been widely exploited in many fields, they are vulnerable to adversarial attacks by adding small perturbations to legitimate inputs to fool targeted models. However, few studies have focused on intelligent networking in such an adversarial environment, which can pose serious security threats. In fact, while challenging intelligent networking, adversarial environments also bring about opportunities. In this paper, we, for the first time, simultaneously analyze the challenges and opportunities that the adversarial environment brings to intelligent networking. Specifically, we focus on challenges that the adversarial environment will pose on the existing intelligent networking. Furthermore, we investigate frameworks and approaches that combine adversarial machine learning with intelligent networking to solve the existing deficiencies of intelligent networking. Finally, we summarize the issues, including opportunities and challenges, which can allow researchers to focus on intelligent networking in adversarial environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Cabaj K, Mazurczyk W, Nowakowski P, et al. Towards distributed network covert channels detection using data mining-based approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018. 12

  2. Mirsky Y, Doitshman T, Elovici Y, et al. KitSune: an ensemble of autoencoders for online network intrusion detection. In: Proceedings of Network and Distributed Systems Security Symposium, 2018

  3. Chen L, Lingys J, Chen K, et al. AuTO: scaling deep reinforcement learning for datacenter-scale automatic traffic optimization. In: Proceedings of ACM SIGCOMM, 2018. 191–205

  4. Bega D, Gramaglia M, Fiore M, et al. AZTEC: anticipatory capacity allocation for zero-touch network slicing. In: Proceedings of IEEE INFOCOM, 2020. 794–803

  5. Zhao Y, Qiao M N, Wang H Y, et al. TDFI: two-stage deep learning framework for friendship inference via multi-source information. In: Proceedings of IEEE INFOCOM, 2019. 1981–1989

  6. Benzaid C, Taleb T. AI-driven zero touch network and service management in 5G and beyond: challenges and research directions. IEEE Network, 2020, 34: 186–194

    Article  Google Scholar 

  7. Lei K, Liang Y Z, Li W. Congestion control in SDN-based networks via multi-task deep reinforcement learning. IEEE Network, 2020, 34: 28–34

    Article  Google Scholar 

  8. Gong S M, Lu X, Hoang D T, et al. Toward smart wireless communications via intelligent reflecting surfaces: a contemporary survey. IEEE Commun Surv Tut, 2020, 22: 2283–2314

    Article  Google Scholar 

  9. Lin Y, Zhao H J, Tu Y, et al. Threats of adversarial attacks in DNN-based modulation recognition. In: Proceedings of IEEE INFOCOM, 2020. 2469–2478

  10. Sagduyu Y E, Shi Y, Erpek T. Adversarial deep learning for over-the-air spectrum poisoning attacks. IEEE Trans Mobile Comput, 2021, 20: 306–319

    Article  Google Scholar 

  11. Qiu H, Dong T, Zhang T W, et al. Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J, 2021, 8: 10327–10335

    Article  Google Scholar 

  12. Han D Q, Wang Z L, Zhong Y, et al. Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors. IEEE J Sel Areas Commun, 2021, 39: 2632–2647

    Article  Google Scholar 

  13. Xu Z Y, Tang J, Yin C X, et al. Experience-driven congestion control: when multi-path TCP meets deep reinforcement learning. IEEE J Sel Areas Commun, 2019, 37: 1325–1336

    Article  Google Scholar 

  14. Boyan J A, Littman M L. Packet routing in dynamically changing networks: a reinforcement learning approach. In: Proceedings of Conference and Workshop on Neural Information Processing Systems, 1994. 671–678

  15. Fu C P, Li Q, Shen M, et al. Realtime robust malicious traffic detection via frequency domain analysis. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, 2021. 3431–3446

  16. Liu C Y, Xu M W, Yang Y, et al. DRL-OR: deep reinforcement learning-based online routing for multi-type service requirements. In: Proceedings of IEEE INFOCOM, 2021

  17. Yan S Y, Wang X L, Zheng X L, et al. ACC: automatic ECN tuning for high-speed datacenter networks. In: Proceedings of ACM SIGCOMM, 2021. 384–397

  18. Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative adversarial nets. In: Proceedings of Conference and Workshop on Neural Information Processing Systems, 2014. 2672–2680

  19. Ma X J, Li B, Wang Y S, et al. Characterizing adversarial subspaces using local intrinsic dimensionality. In: Proceedings of International Conference on Learning Representations, 2018

  20. Li J, Liu Y, Chen T, et al. Adversarial attacks and defenses on cyber-physical systems: a survey. IEEE Internet Things J, 2020, 7: 5103–5115

    Article  Google Scholar 

  21. Wang N, Chen Y M, Hu Y, et al. MANDA: on adversarial example detection for network intrusion detection system. IEEE Trans Depend Secure Comput, 2022. doi: https://doi.org/10.1109/TDSC.2022.3148990

  22. Treu M, Le T N, Nguyen H H, et al. Fashion-guided adversarial attack on person segmentation. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 2021. 943–952

  23. Chen Y X, Yuan X J, Zhang J S, et al. Devil’s whisper: a general approach for physical adversarial attacks against commercial black-box speech recognition devices. In: Proceedings of USENIX Security, 2020. 2667–2684

  24. Wu F, Long Y H, Zhang C, et al. LinkTeller: recovering private edges from graph neural networks via influence analysis. In: Proceedings of IEEE Symposium on Security and Privacy (SP), 2022

  25. Xie C L, Chen M H, Chen P Y, et al. CRFL: certifiably robust federated learning against backdoor attacks. In: Proceedings of International Conference on Machine Learning, 2021. 11372–11382

  26. Yatsura M, Metzen J, Hein M. Meta-learning the search distribution of black-box random search based adversarial attacks. In: Proceedings of Conference and Workshop on Neural Information Processing Systems, 2021

  27. Chivukula A S, Liu W. Adversarial deep learning models with multiple adversaries. IEEE Trans Knowl Data Eng, 2019, 31: 1066–1079

    Article  Google Scholar 

  28. Zhao Y, Xu K, Wang H Y, et al. Stability-based analysis and defense against backdoor attacks on edge computing services. IEEE Network, 2021, 35: 163–169

    Article  Google Scholar 

  29. Hameed M Z, Gyorgy A, Gunduz D. The best defense is a good offense: adversarial attacks to avoid modulation detection. IEEE Trans Inform Forensic Secur, 2020, 16: 1074–1087

    Article  Google Scholar 

  30. Usama M, Mitra R, Ilahi I, et al. Examining machine learning for 5G and beyond through an adversarial lens. IEEE Internet Comput, 2021, 25: 26–34

    Article  Google Scholar 

  31. Zanella-Beguelin S, Tople S, Paverd A, et al. Grey-box extraction of natural language models. In: Proceedings of International Conference on Machine Learning, 2021. 12278–12286

  32. Goodfellow I J, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. In: Proceedings of International Conference on Learning Representations, 2015

  33. Madry A, Makelov A, Schmidt L, et al. Towards deep learning models resistant to adversarial attacks. In: Proceedings of International Conference on Learning Representations, 2018

  34. Moosavi-Dezfooli S M, Fawzi A, Frossard P. Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 2016. 2574–2582

  35. Carlini N, Wagner D. Towards evaluating the robustness of neural networks. In: Proceedings of IEEE Symposium on Security and Privacy (SP), 2017. 39–57

  36. Yang Z L, Li B, Chen P Y, et al. Characterizing audio adversarial examples using temporal dependency. In: Proceedings of International Conference on Learning Representations, 2019

  37. Wang X F, Han Y W, Wang C Y, et al. In-Edge AI: intelligentizing mobile edge computing, caching and communication by federated learning. IEEE Network, 2019, 33: 156–165

    Article  Google Scholar 

  38. Yin C L, Zhu Y F, Fei J L, et al. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 2017, 5: 21954–21961

    Article  Google Scholar 

  39. Diro A, Chilamkurti N. Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun Mag, 2018, 56: 124–130

    Article  Google Scholar 

  40. Liang E, Zhu H, Jin X, et al. Neural packet classification. In: Proceedings of ACM SIGCOMM, 2019. 256–269

  41. Lin Y C, Hong Z W, Liao Y H, et al. Tactics of adversarial attack on deep reinforcement learning agents. In: Proceedings of International Joint Conference on Artificial Intelligence, 2017. 3756–3762

  42. Wang F, Zhong C, Gursoy M C, et al. Defense strategies against adversarial jamming attacks via deep reinforcement learning. In: Proceedings of the 54th Annual Conference on Information Sciences and Systems (CISS), 2020. 1–6

  43. Qu Y Y, Zhang J W, Li R D, et al. Generative adversarial networks enhanced location privacy in 5G networks. Sci China Inf Sci, 2020, 63: 220303

    Article  MathSciNet  Google Scholar 

  44. Liu Y, Zhao Y, Zhou G M, et al. FedPrune: personalized and communication-efficient federated learning on non-IID data. In: Proceedings of International Conference on Neural Information Processing, 2021. 430–437

  45. Hitaj B, Ateniese G, Perez-Cruz F. Deep models under the GAN: information leakage from collaborative deep learning. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, 2017. 603–618

Download references

Acknowledgements

This work was in part supported by National Science Foundation for Distinguished Young Scholars of China (Grant No. 61825204), National Natural Science Foundation of China (Grant Nos. 61932016, 62132011), Beijing Outstanding Young Scientist Program (Grant No. BJJWZYJH01201910003011), China Postdoctoral Science Foundation (Grant No. 2021M701894), and China National Postdoctoral Program for Innovative Talents. Dan WANG’s work is supported in part by General Research Fund (Grant Nos. 15210119, 15209220, 15200321), Innovation Technology Fund (ITSP Program ITS/070/19FP), Collaborative Research Fund (Grant Nos. C5026-18G, C5018-20G), The Hong Kong Polytechnic University (Grant No. 1-ZVPz), and a Huawei Collaborative Project. We also thank anonymous reviewers for their comments and guidance.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ke Xu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, Y., Xu, K., Li, Q. et al. Intelligent networking in adversarial environment: challenges and opportunities. Sci. China Inf. Sci. 65, 170301 (2022). https://doi.org/10.1007/s11432-021-3463-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-021-3463-9

Keywords

Navigation