FINDING · DETECTION

Adversarial pre-padding — prepending stochastic byte noise to packets — degrades ET-BERT encrypted traffic classification accuracy from >99% to 25.68%, exposing a structural vulnerability in all payload-byte-dependent detection systems. White-box adversarial attacks (Ayaka AH-MSI) additionally achieve evasion rates exceeding 99.5% against standard continuous-time sequence models via Manifold Shattering, where adversaries align malicious temporal distributions with benign baselines.

From 2026-ferrel-aegis-adversarial-entropy-guidedAEGIS: Adversarial Entropy-Guided Immune System -- Thermodynamic State Space Models for Zero-Day Network Evasion Detection · §II, §VI-A · 2026 · arXiv preprint

Implications

Tags

censors
generic
techniques
dpiml-classifier
defenses
randomizationvless

Extracted by claude-sonnet-4-6 — review before relying.