Better Safe Than Never: A Survey on Adversarial Machine Learning Applications towards IoT Environment

被引:5
作者
Alkadi, Sarah [1 ]
Al-Ahmadi, Saad [1 ]
Ben Ismail, Mohamed Maher [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh 11362, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 10期
关键词
Internet of Things (IoT); Cybersecurity; intrusion detection; adversarial machine learning (AML); INTRUSION; INTERNET; NETWORKS; SECURITY; THREATS;
D O I
10.3390/app13106001
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Internet of Things (IoT) technologies serve as a backbone of cutting-edge intelligent systems. Machine Learning (ML) paradigms have been adopted within IoT environments to exploit their capabilities to mine complex patterns. Despite the reported promising results, ML-based solutions exhibit several security vulnerabilities and threats. Specifically, Adversarial Machine Learning (AML) attacks can drastically impact the performance of ML models. It also represents a promising research field that typically promotes novel techniques to generate and/or defend against Adversarial Examples (AE) attacks. In this work, a comprehensive survey on AML attack and defense techniques is conducted for the years 2018-2022. The article investigates the employment of AML techniques to enhance intrusion detection performance within the IoT context. Additionally, it depicts relevant challenges that researchers aim to overcome to implement proper IoT-based security solutions. Thus, this survey aims to contribute to the literature by investigating the application of AML concepts within the IoT context. An extensive review of the current research trends of AML within IoT networks is presented. A conclusion is reached where several findings are reported including a shortage of defense mechanisms investigations, a lack of tailored IoT-based solutions, and the applicability of the existing mechanisms in both attack and defense scenarios.
引用
收藏
页数:33
相关论文
共 106 条
  • [1] Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
    Abu Alsheikh, Mohammad
    Lin, Shaowei
    Niyato, Dusit
    Tan, Hwee-Pink
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04): : 1996 - 2018
  • [2] Defense against Universal Adversarial Perturbations
    Akhtar, Naveed
    Liu, Jian
    Mian, Ajmal
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 3389 - 3398
  • [3] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [4] Alatwi HA, 2021, Arxiv, DOI arXiv:2112.03315
  • [5] [Anonymous], 2019, TON IOT DAT, DOI [10.21227/feszdm97#, DOI 10.21227/FESZDM97#]
  • [6] Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
    Anthi, Eirini
    Williams, Lowri
    Laved, Amir
    Burnap, Pete
    [J]. COMPUTERS & SECURITY, 2021, 108
  • [7] Athalye A, 2018, PR MACH LEARN RES, V80
  • [8] Wild patterns: Ten years after the rise of adversarial machine learning
    Biggio, Battista
    Roli, Fabio
    [J]. PATTERN RECOGNITION, 2018, 84 : 317 - 331
  • [9] Biggio Battista, 2011, P 3 AS C MACH LEARN, P97
  • [10] How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey
    Bout, Emilie
    Loscri, Valeria
    Gallais, Antoine
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01) : 248 - 279