Repository logo
 
Publication

Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification

dc.contributor.authorVitorino, João
dc.contributor.authorPraça, Isabel
dc.contributor.authorMaia, Eva
dc.date.accessioned2023-09-05T11:02:31Z
dc.date.available2023-09-05T11:02:31Z
dc.date.issued2023
dc.description.abstractThe internet of things (IoT) faces tremendous security challenges. Machine learning models can be used to tackle the growing number of cyber-attack variations targeting IoT systems, but the increasing threat posed by adversarial attacks restates the need for reliable defense strategies. This work describes the types of constraints required for a realistic adversarial cyber-attack example and proposes a methodology for a trustworthy adversarial robustness analysis with a realistic adversarial evasion attack vector. The proposed methodology was used to evaluate three supervised algorithms, random forest (RF), extreme gradient boosting (XGB), and light gradient boosting machine (LGBM), and one unsupervised algorithm, isolation forest (IFOR). Constrained adversarial examples were generated with the adaptative perturbation pattern method (A2PM), and evasion attacks were performed against models created with regular and adversarial training. Even though RF was the least affected in binary classification, XGB consistently achieved the highest accuracy in multi-class classification. The obtained results evidence the inherent susceptibility of tree-based algorithms and ensembles to adversarial evasion attacks and demonstrate the benefits of adversarial training and a security-by-design approach for a more robust IoT network intrusion detection and cyber-attack classification.pt_PT
dc.description.sponsorshipOpen access funding provided by FCT|FCCN (b-on). The present work was partially supported by the Norte Portugal Regional Operational Programme (NORTE 2020), under the PORTUGAL 2020 Partnership Agreement, through the European Regional Development Fund (ERDF), within project “Cybers SeC IP” (NORTE-01-0145-FEDER-000044). This work has also received funding from UIDB/00760/2020.pt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.doi10.1007/s12243-023-00953-ypt_PT
dc.identifier.urihttp://hdl.handle.net/10400.22/23450
dc.language.isoengpt_PT
dc.publisherSpringerpt_PT
dc.relationNORTE-01-0145-FEDER-000044pt_PT
dc.relationResearch Group on Intelligent Engineering and Computing for Advanced Innovation and Development
dc.relation.publisherversionhttps://link.springer.com/article/10.1007/s12243-023-00953-ypt_PT
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/pt_PT
dc.subjectAdversarial attackspt_PT
dc.subjectAdversarial robustnesspt_PT
dc.subjectMachine learningpt_PT
dc.subjectTabular datapt_PT
dc.subjectInternet of thingspt_PT
dc.subjectIntrusion detectionpt_PT
dc.titleTowards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classificationpt_PT
dc.typejournal article
dspace.entity.typePublication
oaire.awardTitleResearch Group on Intelligent Engineering and Computing for Advanced Innovation and Development
oaire.awardURIinfo:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UIDB%2F00760%2F2020/PT
oaire.citation.endPage412pt_PT
oaire.citation.issue78pt_PT
oaire.citation.startPage401pt_PT
oaire.citation.titleAnnals of Telecommunicationspt_PT
oaire.fundingStream6817 - DCRRNI ID
person.familyNameMachado Vitorino
person.familyNamePraça
person.familyNameMaia
person.givenNameJoão Pedro
person.givenNameIsabel
person.givenNameEva
person.identifierHlqCxhoAAAAJ
person.identifier299522
person.identifier.ciencia-id3312-592F-B628
person.identifier.ciencia-idC710-4218-1BFF
person.identifier.ciencia-id4F14-EF83-C4B9
person.identifier.orcid0000-0002-4968-3653
person.identifier.orcid0000-0002-2519-9859
person.identifier.orcid0000-0002-8075-531X
person.identifier.ridK-8430-2014
person.identifier.scopus-author-id57579914600
person.identifier.scopus-author-id22734900800
project.funder.identifierhttp://doi.org/10.13039/501100001871
project.funder.nameFundação para a Ciência e a Tecnologia
rcaap.rightsopenAccesspt_PT
rcaap.typearticlept_PT
relation.isAuthorOfPublication4435bb64-8a77-407b-ba18-4833d26e72ae
relation.isAuthorOfPublicationee4ecacd-c6c6-41e8-bca1-21a60ff05f50
relation.isAuthorOfPublication47a108c4-cf8a-46f3-8954-90624174e8fc
relation.isAuthorOfPublication.latestForDiscoveryee4ecacd-c6c6-41e8-bca1-21a60ff05f50
relation.isProjectOfPublicationdb3e2edb-b8af-487a-b76a-f6790ac2d86e
relation.isProjectOfPublication.latestForDiscoverydb3e2edb-b8af-487a-b76a-f6790ac2d86e

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ART_GECAD_JVitorino_2023.pdf
Size:
1.19 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: