- Title
- Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Creator
- Khoda, Mahbub; Imam, Tasadduq; Kamruzzaman, Joarder; Gondal, Iqbal; Rahman, Ashfaqur
- Date
- 2019
- Type
- Text; Journal article
- Identifier
- http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/171719
- Identifier
- vital:14385
- Identifier
-
https://doi.org/10.1109/TIA.2019.2958530
- Identifier
- ISBN:0093-9994
- Abstract
- Industrial Internet of Things (IIoT) deploys edge devices to act as intermediaries between sensors and actuators and application servers or cloud services. Machine learning models have been widely used to thwart malware attacks in such edge devices. However, these models are vulnerable to adversarial attacks where attackers craft adversarial samples by introducing small perturbations to malware samples to fool a classifier to misclassify them as benign applications. Literature on deep learning networks proposes adversarial retraining as a defense mechanism where adversarial samples are combined with legitimate samples to retrain the classifier. However, existing works select such adversarial samples in a random fashion which degrades the classifier's performance. This work proposes two novel approaches for selecting adversarial samples to retrain a classifier. One, based on the distance from malware cluster center, and the other, based on a probability measure derived from a kernel based learning (KBL). Our experiments show that both of our sample selection methods outperform the random selection method and the KBL selection method improves detection accuracy by 6%. Also, while existing works focus on deep neural networks with respect to adversarial retraining, we additionally assess the impact of such adversarial samples on other classifiers and our proposed selective adversarial retraining approaches show similar performance improvement for these classifiers as well. The outcomes from the study can assist in designing robust security systems for IIoT applications.
- Publisher
- Institute of Electrical and Electronics Engineers (IEEE)
- Relation
- IEEE Transactions on Industry Applications Vol.56, no 4. (2020), p. 4415-4424
- Rights
- Copyright @ 2019 IEEE
- Rights
- This metadata is freely available under a CCO license
- Subject
- 08 Information and Computing Sciences; 09 Engineering; Malware; Feature Extraction; Machine Learning; Sensors; Servers; Neural Networks; Security; Engineering
- Full Text
- Reviewed
- Hits: 4496
- Visitors: 4537
- Downloads: 372
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | Accepted | 1 MB | Adobe Acrobat PDF | View Details Download |