论文标题

部分可观测时空混沌系统的无模型预测

AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks

论文作者

Pashamokhtari, Arman, Batista, Gustavo, Gharakheili, Hassan Habibi

论文摘要

基于机器学习的技术在网络智能方面取得了成功。但是,它们越来越成为复杂数据驱动的对抗攻击的目标,导致错误预测,从而削弱了他们检测网络设备上威胁的能力。在本文中,我们提出了Adiotack,该系统强调了针对对抗性攻击的决策树的漏洞,帮助网络安全团队量化并完善其训练有素的模型以监视IoT网络的弹性。为了评估最坏情况的模型,Adiotack执行了白色框对抗性学习,以发射成功的体积攻击,而决策树集合模型无法提示。我们的第一个贡献是开发一种白色框算法,该算法采用训练有素的决策树集合模型以及对受害者类作为输入的预期基于网络的攻击的概况。然后,它会自动生成配方,该配方在凹痕攻击数据包(少于15%的开销)上指定某些数据包可以绕过未注意的推论模型。我们确保生成的攻击实例可用于在IP网络上启动并有效地进行体积影响。我们的第二个贡献开发了一种积极监视连接设备的网络行为的方法,代表受害者IoT设备注入对抗性流量(可行),并成功启动了预期的攻击。我们的第三个贡献原型Adiotack,并在测试台上验证了其功效,该测试台由少数由训练有素的推理模型监视的真实物联网设备组成。我们演示了该模型如何检测对物联网设备上的所有非对抗性体积攻击,同时缺少许多对抗性攻击。第四个贡献开发了用于将斑块应用于训练有素的决策树集合模型的系统方法,从而提高了对对抗性体积攻击的韧性。

Machine Learning-based techniques have shown success in cyber intelligence. However, they are increasingly becoming targets of sophisticated data-driven adversarial attacks resulting in misprediction, eroding their ability to detect threats on network devices. In this paper, we present AdIoTack, a system that highlights vulnerabilities of decision trees against adversarial attacks, helping cybersecurity teams quantify and refine the resilience of their trained models for monitoring IoT networks. To assess the model for the worst-case scenario, AdIoTack performs white-box adversarial learning to launch successful volumetric attacks that decision tree ensemble models cannot flag. Our first contribution is to develop a white-box algorithm that takes a trained decision tree ensemble model and the profile of an intended network-based attack on a victim class as inputs. It then automatically generates recipes that specify certain packets on top of the indented attack packets (less than 15% overhead) that together can bypass the inference model unnoticed. We ensure that the generated attack instances are feasible for launching on IP networks and effective in their volumetric impact. Our second contribution develops a method to monitor the network behavior of connected devices actively, inject adversarial traffic (when feasible) on behalf of a victim IoT device, and successfully launch the intended attack. Our third contribution prototypes AdIoTack and validates its efficacy on a testbed consisting of a handful of real IoT devices monitored by a trained inference model. We demonstrate how the model detects all non-adversarial volumetric attacks on IoT devices while missing many adversarial ones. The fourth contribution develops systematic methods for applying patches to trained decision tree ensemble models, improving their resilience against adversarial volumetric attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源