Towards adversarial realism and robust learning for IoT intrusion detection and classification

被引:0
作者
João Vitorino
Isabel Praça
Eva Maia
机构
[1] School of Engineering,Research Group on Intelligent Engineering and Computing for Advanced Innovation and Development (GECAD)
[2] Polytechnic of Porto (ISEP/IPP),undefined
来源
Annals of Telecommunications | 2023年 / 78卷
关键词
Adversarial attacks; Adversarial robustness; Machine learning; Tabular data; Internet of things; Intrusion detection;
D O I
暂无
中图分类号
学科分类号
摘要
The internet of things (IoT) faces tremendous security challenges. Machine learning models can be used to tackle the growing number of cyber-attack variations targeting IoT systems, but the increasing threat posed by adversarial attacks restates the need for reliable defense strategies. This work describes the types of constraints required for a realistic adversarial cyber-attack example and proposes a methodology for a trustworthy adversarial robustness analysis with a realistic adversarial evasion attack vector. The proposed methodology was used to evaluate three supervised algorithms, random forest (RF), extreme gradient boosting (XGB), and light gradient boosting machine (LGBM), and one unsupervised algorithm, isolation forest (IFOR). Constrained adversarial examples were generated with the adaptative perturbation pattern method (A2PM), and evasion attacks were performed against models created with regular and adversarial training. Even though RF was the least affected in binary classification, XGB consistently achieved the highest accuracy in multi-class classification. The obtained results evidence the inherent susceptibility of tree-based algorithms and ensembles to adversarial evasion attacks and demonstrate the benefits of adversarial training and a security-by-design approach for a more robust IoT network intrusion detection and cyber-attack classification.
引用
收藏
页码:401 / 412
页数:11
相关论文
共 92 条
[1]  
Butun I(2020)Security of the internet of things: vulnerabilities, attacks, and countermeasures IEEE Commun Surv Tutorials 22 616-644
[2]  
Osterberg P(2018)Industrial internet of things: challenges, opportunities, and directions IEEE Trans Ind Informatics 14 4724-4734
[3]  
Song H(2019)Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale iot exploitations IEEE Commun Surv Tutorials 21 2702-2733
[4]  
Sisinni E(2020)A review on machine learning–based approaches for Internet traffic classification Ann Telecommun 75 673-710
[5]  
Saifullah A(2016)Performance evaluation of supervised machine learning algorithms for intrusion detection Procedia Comput Sci 89 117-123
[6]  
Han S(2021)Launching adversarial attacks against network intrusion detection systems for IoT J Cybersecurity Priv 1 252-273
[7]  
Jennehag U(2014)Security evaluation of pattern classifiers under attack IEEE Trans Knowl Data Eng 26 984-996
[8]  
Gidlund M(2020)Adversarial machine learning applied to intrusion and malware scenarios: a systematic review IEEE Access. 8 35403-35419
[9]  
Neshenko N(2020)Hardening random forest cyber detectors against adversarial attacks IEEE Trans Emerg Top Comput Intell 4 427-439
[10]  
Bou-Harb E(2020)Understanding and improving fast adversarial training Adv. Neural Inf. Proces. Syst. 33 16048-16059