Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks

被引:120
作者
Ibitoye, Olakunle [1 ]
Shafiq, Omair [1 ]
Matrawy, Ashraf [1 ]
机构
[1] Carleton Univ, Sch Informat Technol, Ottawa, ON, Canada
来源
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2019年
基金
加拿大自然科学与工程研究理事会;
关键词
Intrusion Detection; Adversarial samples; Feed-forward Neural Networks (FNN); Resilience; Self-normalizing Neural Networks (SNN); Internet of things (IoT);
D O I
10.1109/globecom38437.2019.9014337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial attacks have been widely studied in the field of computer vision but their impact on network security applications remains an area of open research. As IoT, 5G and AI continue to converge to realize the promise of the fourth industrial revolution (Industry 4.0), security incidents and events on IoT networks have increased. Deep learning techniques are being applied to detect and mitigate many of such security threats against IoT networks. Feed-forward Neural Networks (FNN) have been widely used for classifying intrusion attacks in IoT networks. In this paper, we consider a variant of the FNN known as the Self-normalizing Neural Network (SNN) and compare its performance with the FNN for classifying intrusion attacks in an IoT network. Our analysis is performed using the BoT-IoT dataset from the Cyber Range Lab of the center of UNSW Canberra Cyber. In our experimental results, the FNN outperforms the SNN for intrusion detection in IoT networks based on multiple performance metrics such as accuracy, precision, and recall as well as multi-classification metrics such as Cohen Cappas score. However, when tested for adversarial robustness, the SNN demonstrates better resilience against the adversarial samples from the IoT dataset, presenting a promising future in the quest for safer and more secure deep learning in IoT networks.
引用
收藏
页数:6
相关论文
共 17 条
  • [1] [Anonymous], 2018, ARXIV181100701
  • [2] Glorot X., 2010, P 13 INT C ART INT S, V9, P249
  • [3] Gong Z., 2017, ARXIV170404960
  • [4] Goodfellow I J, 2015, P INT C LEARN REPR I
  • [5] LEMNA: Explaining Deep Learning based Security Applications
    Guo, Wenbo
    Mu, Dongliang
    Xu, Jun
    Su, Purui
    Wang, Gang
    Xing, Xinyu
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 364 - 379
  • [6] Hodo E., 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC), P1, DOI [10.1109/ISNCC.2016.7746067, DOI 10.1109/ISNCC.2016.7746067]
  • [7] Javaid A., 2016, P 9 EAI INT C BIOINS, V3, P2, DOI [DOI 10.4108/EAI.3-12-2015.2262516, 10.4108/eai.3-12-2015.2262516]
  • [8] Klambauer G., 2017, Advances in Neural Information Processing Systems, V30, P972
  • [9] KURAKIN A, 2017, ICLR WORKSH
  • [10] Efficient backprop
    LeCun, Y
    Bottou, L
    Orr, GB
    Müller, KR
    [J]. NEURAL NETWORKS: TRICKS OF THE TRADE, 1998, 1524 : 9 - 50