Abstract
While machine learning (ML)-based solutions for Internet of Things (IoT) device identification are effective in identifying IoT devices connected to the network, they may be vulnerable to adversarial attacks. Conventional approaches for crafting adversarial attacks from the computer vision (CV) domain are not applicable in the computer network domain as they interfere with the meaningful communication of devices. In this research, we evaluate the robustness of payload-based IoT device identification solutions against adversarial examples generated using our new approach for the real-time crafting of adversarial examples; this approach, which is also applicable to the computer network domain, uses heatmaps generated by class activation mapping (CAM) and Grad-CAM++. We evaluate the effectiveness of adversarial examples generated using the above two methods against six variants of an existing payload-based ML IoT identification solution in a real-time end-to-end scenario. We show that in many cases, an adversarial example crafted using a heatmap can fool the examined variants of an existing payload-based IoT device identification solution with up to 100% accuracy.
Original language | English |
---|---|
Pages (from-to) | 7868-7883 |
Number of pages | 16 |
Journal | IEEE Internet of Things Journal |
Volume | 10 |
Issue number | 9 |
DOIs | |
State | Published - 16 Dec 2022 |
Keywords
- Adversarial attack
- Internet of Things (IoT)
- IoT identification
- cybersecurity
- machine learning (ML)
ASJC Scopus subject areas
- Information Systems
- Signal Processing
- Hardware and Architecture
- Computer Networks and Communications
- Computer Science Applications