Denial of Service (DoS) Defences against Adversarial Attacks in IoT Smart Home Networks using Machine Learning Methods

Z. Iqbal, Azhar Imran, Amanullah Yasin, Adnan Alvi
{"title":"Denial of Service (DoS) Defences against Adversarial Attacks in IoT Smart Home Networks using Machine Learning Methods","authors":"Z. Iqbal, Azhar Imran, Amanullah Yasin, Adnan Alvi","doi":"10.24949/njes.v15i1.677","DOIUrl":null,"url":null,"abstract":"The availability of information and its integrity and confidentiality are important factors in information and communication of the system security. The DDoS attack generally means Distributed denial of services generates many enormous packets to slow and down the Services for actual users who use services. The study examines the impact of a considerable rise in the number of connected devices in the IoT concept on the quantity and volume of DDoS attacks. Thanks to machine learning-based technology, intrusion Detection Systems (IDS) can be versatile and efficient. However, the advancement of machine learning systems, alongside the application of the uses for Adversarial Machine Learning, has also introduced a new potential attack vector; machine learning models which support the uses of the IDS’ decisions may be subject to cyberattacks known as Adversarial Machine Learning (AML). AML is widely applicable to manipulating data and network traffic that transverse networked devices in the IoT setting. However, harmful network packets are frequently misclassified as benign perturbations in the machine learning classifier’s decision bounds. Because of this, machine learning-based detectors such as malware scanners skip those flaws and reduce the risk of delaying detection and spreading malicious code, and incurring issues such as personal information leaking, damaged hardware, and financial loss. Furthermore, this research investigates which DoS attack techniques should be implemented and how adversary samples should be constructed to strengthen the robustness of supervised models utilizing adversarial training. The system obtained 99.98% accuracy with XGBoost and 99.96% accuracy achieved with the decision tree and AdaBoost.","PeriodicalId":338631,"journal":{"name":"NUST Journal of Engineering Sciences","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"NUST Journal of Engineering Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24949/njes.v15i1.677","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The availability of information and its integrity and confidentiality are important factors in information and communication of the system security. The DDoS attack generally means Distributed denial of services generates many enormous packets to slow and down the Services for actual users who use services. The study examines the impact of a considerable rise in the number of connected devices in the IoT concept on the quantity and volume of DDoS attacks. Thanks to machine learning-based technology, intrusion Detection Systems (IDS) can be versatile and efficient. However, the advancement of machine learning systems, alongside the application of the uses for Adversarial Machine Learning, has also introduced a new potential attack vector; machine learning models which support the uses of the IDS’ decisions may be subject to cyberattacks known as Adversarial Machine Learning (AML). AML is widely applicable to manipulating data and network traffic that transverse networked devices in the IoT setting. However, harmful network packets are frequently misclassified as benign perturbations in the machine learning classifier’s decision bounds. Because of this, machine learning-based detectors such as malware scanners skip those flaws and reduce the risk of delaying detection and spreading malicious code, and incurring issues such as personal information leaking, damaged hardware, and financial loss. Furthermore, this research investigates which DoS attack techniques should be implemented and how adversary samples should be constructed to strengthen the robustness of supervised models utilizing adversarial training. The system obtained 99.98% accuracy with XGBoost and 99.96% accuracy achieved with the decision tree and AdaBoost.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用机器学习方法防御物联网智能家庭网络中的拒绝服务(DoS)对抗性攻击
信息的可用性及其完整性和保密性是信息通信系统安全的重要因素。DDoS攻击通常是指分布式拒绝服务,产生大量的数据包,使实际使用服务的用户的服务速度变慢。该研究考察了物联网概念中连接设备数量的大幅增加对DDoS攻击数量和数量的影响。由于基于机器学习的技术,入侵检测系统(IDS)可以是通用和高效的。然而,机器学习系统的进步,以及对抗性机器学习的应用,也引入了一种新的潜在攻击媒介;支持使用IDS决策的机器学习模型可能会受到称为对抗性机器学习(AML)的网络攻击。AML广泛适用于操纵物联网环境中跨网络设备的数据和网络流量。然而,在机器学习分类器的决策界中,有害的网络数据包经常被错误地分类为良性扰动。正因为如此,基于机器学习的检测器(如恶意软件扫描器)可以跳过这些缺陷,降低延迟检测和传播恶意代码的风险,以及导致个人信息泄露、硬件损坏和经济损失等问题的风险。此外,本研究探讨了应该实施哪些DoS攻击技术,以及应该如何构建对手样本,以利用对抗训练加强监督模型的鲁棒性。该系统使用XGBoost获得了99.98%的准确率,使用决策树和AdaBoost获得了99.96%的准确率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Structural Analysis & Shape Optimization for a Control Arm of a Vehicle’s Suspension. Investigating Ground subsidence due to Secret Mining and Repairing Damaged Structures Catalytic Reduction of Carbon dioxide to Methanol as a Fuel, A Mini Review Structural Properties of Mn Doped ZnO Nanocrystallites Using Wet Chemical Synthesis Structural Optimization of Metallic Toroid using Finite Element Method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1