Adversarial Machine Learning Attacks in Internet of Things Systems

被引:1
|
作者
Kone, Rachida [1 ]
Toutsop, Otily [1 ]
Thierry, Ketchiozo Wandji [1 ]
Kornegay, Kevin [1 ]
Falaye, Joy [1 ]
机构
[1] Morgan State Univ, Dept Elect Engn, Baltimore, MD 21251 USA
关键词
Adversarial Machine Learning; Internet of Everything (IoE); Internet of Things (IoT); wireless communication; label-flipping; decision tree;
D O I
10.1109/AIPR57179.2022.10092216
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Researchers are looking into solutions to support the enormous demand for wireless communication, which has been exponentially increasing along with the growth of technology. The sixth generation (6G) Network emerged as the leading solution for satisfying the requirements placed on the telecommunications system. 6G technology mainly depends on various machine learning and artificial intelligence techniques. The performance of these machine learning algorithms is high. Still, their security has been neglected for some reason, which leaves the door open to various vulnerabilities that attackers can exploit to compromise systems. Therefore, it is essential to evaluate the security of machine learning algorithms to prevent them from being spoofed by malicious hackers. Prior research has shown that the decision tree is one of the most popular algorithms used by 80% of researchers for classification problems. In this work, we collect the dataset from a laboratory testbed of over 100 Internet of things (IoT) devices. The devices include smart cameras, smart light bulbs, Alexa, and others. We evaluate classifiers using the original dataset during the experiment and record a 98% accuracy. We then use the label-flipping attack approach to poison our dataset and record the output. As a result, flipping 10%, 20%, 30%, 40%, and 50% of the poison data generated accuracies of 86%, 74%, 64%, 54%, and 50%, respectively.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Advancements in Intrusion Detection Systems for Internet of Things Using Machine Learning
    Ul Haq, Shahid
    Abbas, Ash Mohammad
    2022 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2022,
  • [32] Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems
    P. E. Yugai
    D. A. Moskvin
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1226 - 1233
  • [33] RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
    Eid Rehman
    Muhammad Haseeb-ud-Din
    Arif Jamal Malik
    Tehmina Karmat Khan
    Aaqif Afzaal Abbasi
    Seifedine Kadry
    Muhammad Attique Khan
    Seungmin Rho
    The Journal of Supercomputing, 2022, 78 : 8890 - 8924
  • [34] Robustness Evaluations of Sustainable Machine Learning Models against Data Poisoning Attacks in the Internet of Things
    Dunn, Corey
    Moustafa, Nour
    Turnbull, Benjamin
    SUSTAINABILITY, 2020, 12 (16)
  • [35] Deep Learning for Detection of Routing Attacks in the Internet of Things
    Furkan Yusuf Yavuz
    Devrim Ünal
    Ensar Gül
    International Journal of Computational Intelligence Systems, 2018, 12 : 39 - 58
  • [36] Deep Learning for Detection of Routing Attacks in the Internet of Things
    Yavuz, Furkan Yusuf
    Unal, Devrim
    Gul, Ensar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2019, 12 (01) : 39 - 58
  • [37] Retraction Note: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
    Eid Rehman
    Muhammad Haseeb-ud-Din
    Arif Jamal Malik
    Tehmina Karmat Khan
    Aaqif Afzaal Abbasi
    Seifedine Kadry
    Muhammad Attique Khan
    Seungmin Rho
    The Journal of Supercomputing, 2024, 80 : 10194 - 10195
  • [38] Handling the adversarial attacks: A machine learning's perspective
    Cao, Ning
    Li, Guofu
    Zhu, Pengjia
    Sun, Qian
    Wang, Yingying
    Li, Jing
    Yan, Maoling
    Zhao, Yongbin
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 2929 - 2943
  • [39] Adversarial attacks on machine learning-aided visualizations
    Fujiwara, Takanori
    Kucher, Kostiantyn
    Wang, Junpeng
    Martins, Rafael M.
    Kerren, Andreas
    Ynnerman, Anders
    JOURNAL OF VISUALIZATION, 2024, : 133 - 151
  • [40] Robust in practice: Adversarial attacks on quantum machine learning
    Liao, Haoran
    Convy, Ian
    Huggins, William J.
    Whaley, K. Birgitta
    PHYSICAL REVIEW A, 2021, 103 (04)