Data Poisoning Attacks against Autoencoder-based Anomaly Detection Models: a Robustness Analysis

被引:8
作者
Bovenzi, Giampaolo [1 ]
Foggia, Alessio [1 ]
Santella, Salvatore [1 ]
Testa, Alessandro [1 ]
Persico, Valerio [1 ]
Pescape, Antonio [1 ]
机构
[1] Univ Napoli Federico II, Naples, Italy
来源
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) | 2022年
关键词
D O I
10.1109/ICC45855.2022.9838942
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) is experiencing a strong growth in both industrial and consumer scenarios. At the same time, the devices taking part in delivering IoT services-usually characterized by limited hardware and software resources-are more and more targeted by cyberattacks. This calls for designing and evaluating new approaches for protecting IoT systems, which are challenged by the limited computational capabilities of devices and by the scarce availability of reliable datasets. In line with this need, in this paper we compare three state-of-the-art machine-learning models used for Anomaly Detection based on autoencoders, i.e. shallow Autoencoder, Deep Autoencoder (DAE), and Ensemble of Autoencoders (viz. KitNET). In addition, we evaluate the robustness of such solutions when Data Poisoning Attack (DPA) occurs, to assess the detection performance when the benign traffic used for learning the legitimate behavior of devices is mixed to malicious traffic. The evaluation relies on the public Kitsune Network Attack Dataset. Results reveal that the models do not differ in performance when trained with unpoisoned benign traffic, reaching (at 1% FPR) an F1 score of approximate to 97%. However, when DPA occurs, DAE proves to be the more robust in detection, showing more than 50% of F1 Score with 10% poisoning. Instead, the other models show strong performance drops (down to approximate to 20% F1 Score) by injecting only 0.5% of the malicious traffic.
引用
收藏
页码:5427 / 5432
页数:6
相关论文
共 17 条
  • [1] [Anonymous], 2019, IEEE COMMUNICATIONS
  • [2] [Anonymous], 2020, Sygehusmedicinregistret datadeklaration.pdf Internet
  • [3] [Anonymous], 2009, ACM IMC
  • [4] Apruzzese G., 2019, IEEE CYCON
  • [5] A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios
    Bovenzi, Giampaolo
    Aceto, Giuseppe
    Ciuonzo, Domenico
    Persico, Valerio
    Pescape, Antonio
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [6] Chaabouni N., 2019, IEEE Communications Surveys Tutorials
  • [7] Dainotti A., 2012, IEEE NETWORK
  • [8] Ferreira A. J., 2012, ELSEVIER PATTERN REC
  • [9] Goodge A., 2020, IJCAI
  • [10] Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches
    Hasan, Mahmudul
    Islam, Md. Milon
    Zarif, Md Ishrak Islam
    Hashem, M. M. A.
    [J]. INTERNET OF THINGS, 2019, 7