Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

AdIoTack: : Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks

Published: 01 September 2022 Publication History

Abstract

Machine Learning-based techniques have shown success in cyber intelligence. However, they are increasingly becoming targets of sophisticated data-driven adversarial attacks resulting in misprediction, eroding their ability to detect threats on network devices. In this paper, we present AdIoTack, Funding for this project was provided by CyAmast Pty Ltd. a system that highlights vulnerabilities of decision trees against adversarial attacks, helping cybersecurity teams quantify and refine the resilience of their trained models for monitoring and protecting Internet-of-Things (IoT) networks. In order to assess the model for the worst-case scenario, AdIoTack performs white-box adversarial learning to launch successful volumetric attacks that decision tree ensemble network behavioral models cannot flag. Our first contribution is to develop a white-box algorithm that takes a trained decision tree ensemble model and the profile of an intended network-based attack (e.g., TCP/UDP reflection) on a victim class as inputs. It then automatically generates recipes that specify certain packets on top of the indented attack packets (less than 15% overhead) that together can bypass the inference model unnoticed. We ensure that the generated attack instances are feasible for launching on Internet Protocol (IP) networks and effective in their volumetric impact. Our second contribution develops a method to monitor the network behavior of connected devices actively, inject adversarial traffic (when feasible) on behalf of a victim IoT device, and successfully launch the intended attack. Our third contribution prototypes AdIoTack and validates its efficacy on a testbed consisting of a handful of real IoT devices monitored by a trained inference model. We demonstrate how the model detects all non-adversarial volumetric attacks on IoT devices while missing many adversarial ones. The fourth contribution develops systematic methods for applying patches to trained decision tree ensemble models, improving their resilience against adversarial volumetric attacks. We demonstrate how our refined model detects 92% of adversarial volumetric attacks.

References

[1]
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, A. Mohaisen, Adversarial learning attacks on graph-based IoT malware detection systems, Proc. IEEE ICDCS, Dallas, USA, 2019.
[2]
J. Anand, A. Sivanathan, A. Hamza, H.H. Gharakheili, PARVP: passively assessing risk of vulnerable passwords for HTTP authentication in networked cameras, Proc. ACM Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration (DAI-SNAC), Virtual Event, Germany, 2021.
[3]
M. Barreno, B. Nelson, A.D. Joseph, J.D. Tygar, The security of machine learning, Springer Mach. Learn. 81 (2010) 121148.
[4]
L. Breiman, Bagging predictors, Springer Mach. Learn. 24 (2) (1996) 123–140.
[5]
L. Breiman, Random forests, Springer Mach. Learn. 45 (1) (2001) 5–32.
[6]
S. Calzavara, C. Lucchese, G. Tolomei, S.A. Abebe, S. Orlando, Treant: training evasion-aware decision trees, Data Min. Knowl. Discov. 34 (5) (2020) 1390–1420.
[7]
G. Caminero, M.L. Martín, B. Carro, Adversarial environment reinforcement learning algorithm for intrusion detection, Comput. Netw. 159 (2019) 96–109.
[8]
N. Carlini, D. Wagner, Adversarial examples are not easily detected: bypassing ten detection methods, Proc. ACM AISec, Dallas, USA, 2017.
[9]
H. Chen, H. Zhang, D. Boning, C. Hsieh, Robust decision trees against adversarial examples, Proc. ICML, Long Beach, CA, USA, 2019.
[10]
M. Cheng, T. Le, P.-Y. Chen, J. Yi, H. Zhang, C.-J. Hsieh, Query-efficient hard-label black-box attack:an optimization-based approach, Proc. of ICLR, Vancouver, Canada, 2018.
[11]
Croce, F., Hein, M., Reliable Evaluation of Adversarial Robustness with an Ensemble of Diverse Parameter-free Attacks. arXiv:2003.01690
[12]
CSO, 2017. University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices. https://www.csoonline.com/article/3168763/university-attacked-by-its-own-vending-machines-smart-light-bulbs-and-5-000-iot-devices.html.
[14]
Dhillon, G. S., Azizzadenesheli, K., Lipton, Z. C., Bernstein, J., Kossaifi, J., Khanna, A., Anandkumar, A., Stochastic Activation Pruning for Robust Adversarial Defense. arXiv:1803.01442
[15]
Y. Ding, L. Wang, H. Zhang, J. Yi, D. Fan, B. Gong, Defending against adversarial attacks using random forests, Proc. CVPR, Long Beach, CA, USA, 2019.
[16]
R. Doshi, N. Apthorpe, N. Feamster, Machine learning DDoS detection for consumer internet of things devices, Proc. IEEE S&P Workshops, San Francisco, CA, USA, 2018.
[17]
A. Ferdowsi, W. Saad, Generative adversarial networks for distributed intrusion detection in the internet of things, Proc. IEEE GLOBECOM, Waikoloa, USA, 2019.
[18]
Goodfellow, I.J.; Shlens, J.; Szegedy, C. : Explaining and Harnessing Adversarial Examples. arXiv:1412.6572.
[19]
A. Hamza, H. Habibi Gharakheili, T.A. Benson, V. Sivaraman, Detecting volumetric attacks on IoT devices via SDN-based monitoring of MUD activity, Proc. ACM SOSR, CA, USA, 2019.
[20]
A. Hamza, D. Ranathunga, H. Habibi Gharakheili, T.A. Benson, M. Roughan, V. Sivaraman, Verifying and monitoring IoTs network behavior using MUD profiles, IEEE Trans. Dependable Secure Comput. 19 (1) (2020) 1–18.
[21]
O. Ibitoye, O. Shafiq, A. Matrawy, Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks, Proc. IEEE GLOBECOM, Waikoloa, USA, 2019.
[22]
IBM X-Force Research, 2017. The weaponization of IoT devices. https://www.ibm.com/downloads/cas/6MLEALKV.
[23]
A. Kantchelian, J.D. Tygar, A.D. Joseph, Evasion and hardening of tree ensemble classifiers, Proc. ICML, NY, USA, 2016.
[24]
Z. Katzir, Y. Elovici, Quantifying the resilience of machine learning classifiers used for cyber security, Expert Syst. Appl. 92 (2018) 419–429.
[25]
T.M. Khoshgoftaar, M. Golawala, J.V. Hulse, An empirical study of learning from imbalanced data using random forest, Proc. IEEE ICTAI, Patras, Greece, 2007.
[26]
M. Kührer, T. Hupperich, C. Rossow, T. Holz, Hell of a handshake: abusing TCP for reflective amplification DDoS attacks, Proc. USENIX WOOT, San Diego, USA, 2014.
[28]
LeCun, Y., Cortes, C., Burges, C. J., 1998. The MNIST database of handwritten digits. http://yann.lecun.com/exdb/mnist/.
[29]
T.S. Lim, W.Y. Loh, Y.S. Shih, A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms, Springer Mach. Learn. 40 (3) (2000) 203–228.
[30]
M. Lyu, D. Sherratt, A. Sivanathan, H. H. Gharakheili, A. Radford, V. Sivaraman, Quantifying the reflective DDoS attack capability of household IoT devices, Proc. ACM WiSec, Boston, USA, 2017.
[31]
Magazine, C., 2020. New vulnerability allows DDoS attack and data exfiltration on billions of devices. https://www.cpomagazine.com/cyber-security/new-vulnerability-allows-ddos-attack-and-data-exfiltration-on-billions-of-devices/.
[32]
H. Mahmudul, M.M. Islam, M.I.I. Zarif, M.M.A. Hashem, Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches, Elsevier Internet Things 7 (2019) 100059.
[34]
M. Miettinen, M. S, I. Hafeez, T. Frassetto, N. Asokan, A.R. Sadeghi, S. Tarkoma, IoT SENTINEL: automated device-type identification for security enforcement in IoT, Proc. IEEE ICDCS, Atlanta, USA, 2017.
[35]
NETSCOUT Security, 2020. A Deeper Look at IoT Weaponization. https://bit.ly/3pr3NJT.
[36]
T.D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, A. Sadeghi, DoT: a federated self-learning anomaly detection system for IoT, Proc. IEEE ICDCS, Dallas, USA, 2019.
[37]
Nokia, 2020. Threat intelligence report 2020. Comput. Fraud Secur. 2020(11).
[38]
OPTIV, 2021. Attempted Florida Water Supply Tampering Underscores IoT/OT Security Challenges. https://www.optiv.com/explore-optiv-insights/blog/attempted-florida-water-supply-tampering-underscores-iotot-security.
[39]
Palo Alto Networks, 2020. Unit42 IoT Threat Report. https://start.paloaltonetworks.com/unit-42-iot-threat-report.
[40]
N. Papernot, P.D. McDaniel, S. Jha, M. Fredrikson, Z.B. Celik, A. Swami, The limitations of deep learning in adversarial settings, Proc. IEEE EuroS&P, Saarbrcken, Germany, 2016.
[41]
A. Pashamokhtari, N. Okui, Y. Miyake, M. Nakahara, H. Habibi Gharakheili, Inferring connected IoT devices from IPFIX records in residential ISP networks, Proc. IEEE LCN, Virtual Event, Canada, 2021.
[42]
Y.E. Sagduyu, Y. Shi, T. Erpek, IoT network security from the perspective of adversarial deep learning, Proc. IEEE SECON, Boston, USA, 2019.
[43]
A. Sivanathan, H. H. Gharakheili, V. Sivaraman, Managing IoT cyber-security using programmable telemetry and machine learning, IEEE Trans. Netw. Serv. Manag. 17 (1) (2020) 60–74.
[44]
A. Sivanathan, H. Habibi Gharakheili, F. Loi, A. Radford, C. Wijenayake, A. Vishwanath, V. Sivaraman, Classifying IoT devices in smart environments using network traffic characteristics, IEEE TMC 18 (8) (2019) 1745–1759.
[45]
A. Sivanathan, H. Habibi Gharakheili, V. Sivaraman, Detecting behavioral change of IoT devices using clustering-based network traffic modeling, IEEE Internet Things J. 7 (8) (2020) 7295–7309.
[46]
A. Sivanathan, D. Sherratt, H. H. Gharakheili, A. Radford, C. Wijenayake, A. Vishwanath, V. Sivaraman, Characterizing and classifying IoT traffic in smart cities and campuses, Proc. IEEE INFOCOM Workshops, Atlanta, USA, 2017.
[47]
R. Sommer, V. Paxson, Outside the closed world: on using machine learning for network intrusion detection, Proc. IEEE S&P, Oakland, USA, 2010.
[48]
M. Taghavi, M. Shoaran, Hardware complexity analysis of deep neural networks and decision tree ensembles for real-time neural data classification, Proc. IEEE NER, San Francisco, USA, 2019.
[49]
Verimatrix. IoT security for today’s connected world. https://www.verimatrix.com/markets/internet-of-things.
[50]
P. Vhkainu, M. Lehto, A. Kariluoto, IoT-based adversarial attack’s effect on cloud data platform service in smart building’s context, Proc. ICCWS, Norfolk, USA, 2020.
[51]
Wang, H., Yu, C., A Direct Approach to Robust Deep Learning Using Adversarial Networks. arXiv:1905.09591
[52]
C. Xie, Y. Wu, L. Maaten, A.L. Yuille, K. He, Feature denoising for improving adversarial robustness, Proc. IEEE CVPR, CA, USA, 2019.
[53]
ZDNet, 2021. Ransomware attack halts production at IoT maker Sierra Wireless. https://www.zdnet.com/article/ransomware-attack-halts-production-at-iot-maker-sierra-wireless/.
[54]
C. Zhang, H. Zhang, C.-J. Hsieh, An efficient adversarial attack for tree ensembles, Proc. NeurIPS, Virtual, 2020.

Index Terms

  1. AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Computers and Security
          Computers and Security  Volume 120, Issue C
          Sep 2022
          680 pages

          Publisher

          Elsevier Advanced Technology Publications

          United Kingdom

          Publication History

          Published: 01 September 2022

          Author Tags

          1. Asdversarial machine learning
          2. IoT networks
          3. Volumetric attacks
          4. Decision trees

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 0
            Total Downloads
          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 20 Nov 2024

          Other Metrics

          Citations

          View Options

          View options

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media