Adversarial machine learning in IoT from an insider point of view

被引:22
作者
Aloraini, Fatimah [1 ,2 ]
Javed, Amir [1 ]
Rana, Omer [1 ]
Burnap, Pete [1 ]
机构
[1] Cardiff Univ, Sch Comp Sci & Informat, Cardiff, Wales
[2] Shaqra Univ, Coll Sci & Humanities, Shaqra, Saudi Arabia
基金
英国工程与自然科学研究理事会;
关键词
Adversarial machine learning; Insider; IoT; Cybersecurity; Machine learning; Deep learning; CYBER-PHYSICAL SYSTEMS; INTRUSION DETECTION; SECURITY; INTERNET; INTELLIGENCE; ATTACKS; THINGS;
D O I
10.1016/j.jisa.2022.103341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid progress and significant successes in various applications, machine learning has been considered a crucial component in the Internet of Things ecosystem. However, machine learning models have recently been vulnerable to carefully crafted perturbations, so-called adversarial attacks. A capable insider adversary can subvert the machine learning model at either the training or testing phase, causing them to behave differently. The vulnerability of machine learning to adversarial attacks becomes one of the significant risks. Therefore, there is a need to secure machine learning models enabling the safe adoption in malicious insider cases. This paper reviews and organizes the body of knowledge in adversarial attacks and defense presented in IoT literature from an insider adversary point of view. We proposed a taxonomy of adversarial methods against machine learning models that an insider can exploit. Under the taxonomy, we discuss how these methods can be applied in real-life IoT applications. Finally, we explore defensive methods against adversarial attacks. We believe this can draw a comprehensive overview of the scattered research works to raise awareness of the existing insider threats landscape and encourages others to safeguard machine learning models against insider threats in the IoT ecosystem.
引用
收藏
页数:13
相关论文
共 81 条
[1]   Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Khormali, Aminollah ;
Alasmary, Hisham ;
Park, Jeman ;
Anwar, Afsah ;
Mohaisen, Aziz .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :1296-1305
[2]  
Alasmary Hisham, 2018, Computational Data and Social Networks. 7th International Conference, CSoNet 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11280), P259, DOI 10.1007/978-3-030-04648-4_22
[3]  
Alexey Kurakin, 2018, ARTIF INTELL
[4]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[5]   Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks [J].
Anthi, Eirini ;
Williams, Lowri ;
Laved, Amir ;
Burnap, Pete .
COMPUTERS & SECURITY, 2021, 108
[6]   A Supervised Intrusion Detection System for Smart Home IoT Devices [J].
Anthi, Eirini ;
Williams, Lowri ;
Slowinska, Malgorzata ;
Theodorakopoulos, George ;
Burnap, Pete .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9042-9053
[7]   Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems [J].
Apruzzese, Giovanni ;
Andreolini, Mauro ;
Ferretti, Luca ;
Marchetti, Mirco ;
Colajanni, Michele .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03)
[8]   Addressing Adversarial Attacks Against Security Systems Based on Machine Learning [J].
Apruzzese, Giovanni ;
Colajanni, Michele ;
Ferretti, Luca ;
Marchetti, Mirco .
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, :383-400
[9]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[10]  
Balla P.B., 2018, P 2018 INT C SMART C, V7, P1, DOI [10.1109/ICSCET.2018.8537344, DOI 10.1109/ICSCET.2018.8537344]