Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples

被引:40
作者
Khoda, Mahbub E. [1 ]
Imam, Tasadduq [2 ]
Kamruzzaman, Joarder [1 ]
Gondal, Iqbal [1 ]
Rahman, Ashfaqur [3 ]
机构
[1] Federat Univ Australia, Internet Commerce Secur Lab, Mt Helen, Vic 3350, Australia
[2] CQUniv Australia, Sch Business & Law, Melbourne, Vic 3000, Australia
[3] CSIRO, Data61, Sandy Bay, Tas 7005, Australia
关键词
Malware; Feature extraction; Machine learning; Sensors; Servers; Neural networks; Security; Adversarial retraining; adversarial samples; Industrial IoT (IIoT); machine learning; selective adversarial samples;
D O I
10.1109/TIA.2019.2958530
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Industrial Internet of Things (IIoT) deploys edge devices to act as intermediaries between sensors and actuators and application servers or cloud services. Machine learning models have been widely used to thwart malware attacks in such edge devices. However, these models are vulnerable to adversarial attacks where attackers craft adversarial samples by introducing small perturbations to malware samples to fool a classifier to misclassify them as benign applications. Literature on deep learning networks proposes adversarial retraining as a defense mechanism where adversarial samples are combined with legitimate samples to retrain the classifier. However, existing works select such adversarial samples in a random fashion which degrades the classifier's performance. This work proposes two novel approaches for selecting adversarial samples to retrain a classifier. One, based on the distance from malware cluster center, and the other, based on a probability measure derived from a kernel-based learning (KBL). Our experiments show that both of our sample selection methods outperform the random selection method and the KBL selection method improves detection accuracy by 6%. Also, while existing works focus on deep neural networks with respect to adversarial retraining, we additionally assess the impact of such adversarial samples on other classifiers and our proposed selective adversarial retraining approaches show similar performance improvement for these classifiers as well. The outcomes from the study can assist in designing robust security systems for IIoT applications.
引用
收藏
页码:4415 / 4424
页数:10
相关论文
共 44 条
[1]   Analysis of Clustering Technique in Android Malware Detection [J].
Abu Samra, Aiman A. ;
Yim, Kangbin ;
Ghanem, Osama A. .
2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, :729-733
[2]   Identifying Android malware using dynamically obtained features [J].
Afonso, Vitor Monte ;
de Amorim, Matheus Favero ;
Abed Gregio, Andre Ricardo ;
Junquera, Glauco Barroso ;
de Geus, Paulo Licio .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01) :9-17
[3]   Pavement performance follow-up and evaluation of polymer-modified test sections [J].
Ahmed, Abubeker Worake ;
Said, Safwat Fadhil ;
Lu, Xiaohu ;
Carlsson, Hakan .
INTERNATIONAL JOURNAL OF PAVEMENT ENGINEERING, 2019, 20 (12) :1474-1487
[4]  
Anderson Hyrum S, 2017, Black Hat
[5]  
Androguard, 2017, ANDR ANDR
[6]  
[Anonymous], 2017, ARXIV
[7]  
[Anonymous], worthy and Reliable Large-Scale Machine Learning Models
[8]  
[Anonymous], 2017, ARXIV170404960
[9]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[10]   IQ-Hopping : Distributed Oblivious Channel Selection for Wireless Networks [J].
Bhartia, Apury ;
Chakrabarty, Deeparnab ;
Chintalapudi, Krishna ;
Qiu, Lili ;
Radunovic, Bozidar ;
Ramjee, Ramachandran .
MOBIHOC '16: PROCEEDINGS OF THE 17TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2016, :81-90