Active Learning Based Adversary Evasion Attacks Defense for Malwares in the Internet of Things

被引:1
|
作者
Ahmed, Usman [1 ]
Lin, Jerry Chun-Wei [1 ]
Srivastava, Gautam [2 ,3 ,4 ]
Jolfaei, Alireza [5 ]
机构
[1] Western Norway Univ Appl Sci, Dept Comp Sci Elect Engn & Math Sci, N-5063 Bergen, Norway
[2] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A6A9, Canada
[3] China Med Ctr, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[4] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[5] Flinders Univ S Australia, Coll Sci & Engn, Tonsley, Australia
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 02期
关键词
Adversarial attacks; android; Internet of Things (IoT); machine learning (ML); malicious adversaries; malware; static analysis;
D O I
10.1109/JSYST.2022.3223694
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we study adversarial evasion attacks in the context of an active learning environment. To prevent evasion attacks in Internet of Things environments, a feature subset selection method is proposed. To train an independent classification model for a single Android application, the approach extracts application-specific data from that application. We compare and evaluate the performance of Android malware benchmarks using ensemble-based active learning, followed by the use of a collaborative machine learning classifier to protect against adversarial evasion attacks on a dataset of Android malware benchmarks. It was found that the proposed approach generates 0.91 receiver operating characteristic with 14 fabricated input features.
引用
收藏
页码:2434 / 2444
页数:11
相关论文
共 50 条
  • [1] Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things
    Rafiq, Husnain
    Aslam, Nauman
    Ahmed, Usman
    Lin, Jerry Chun-Wei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 960 - 968
  • [2] PDAAA: Progressive Defense Against Adversarial Attacks for Deep Learning-as-a-Service in Internet of Things
    Wang, Ling
    Zhang, Cheng
    Luo, Zejian
    Liu, Chenguang
    Liu, Jie
    Zheng, Xi
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 879 - 886
  • [3] Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers
    Pillai, Manu J.
    Remya, S.
    Devika, V.
    Ramasubbareddy, Somula
    Cho, Yongyun
    IEEE ACCESS, 2024, 12 : 19375 - 19387
  • [4] A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks
    Jiang, Jun
    Liu, Yuhong
    Dezfouli, Behnam
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 1194 - 1199
  • [5] Deep Learning for Detection of Routing Attacks in the Internet of Things
    Furkan Yusuf Yavuz
    Devrim Ünal
    Ensar Gül
    International Journal of Computational Intelligence Systems, 2018, 12 : 39 - 58
  • [6] Deep Learning for Detection of Routing Attacks in the Internet of Things
    Yavuz, Furkan Yusuf
    Unal, Devrim
    Gul, Ensar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2019, 12 (01) : 39 - 58
  • [7] Adversarial Machine Learning Attacks in Internet of Things Systems
    Kone, Rachida
    Toutsop, Otily
    Thierry, Ketchiozo Wandji
    Kornegay, Kevin
    Falaye, Joy
    2022 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP, AIPR, 2022,
  • [8] Intrusion detection based on machine learning in the internet of things, attacks and counter measures
    Rehman, Eid
    Haseeb-ud-Din, Muhammad
    Malik, Arif Jamal
    Khan, Tehmina Karmat
    Abbasi, Aaqif Afzaal
    Kadry, Seifedine
    Khan, Muhammad Attique
    Rho, Seungmin
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (06): : 8890 - 8924
  • [9] A Survey on Attacks in Internet of Things Based Networks
    Benzarti, Sana
    Triki, Bayrem
    Korbaa, Ouajdi
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [10] Security defense strategy algorithm for Internet of Things based on deep reinforcement learning
    Feng, Xuecai
    Han, Jikai
    Zhang, Rui
    Xu, Shuo
    Xia, Hui
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):