Discretization-based ensemble model for robust learning in IoT
- URL: http://arxiv.org/abs/2307.08955v1
- Date: Tue, 18 Jul 2023 03:48:27 GMT
- Title: Discretization-based ensemble model for robust learning in IoT
- Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere
- Abstract summary: We propose a discretization-based ensemble stacking technique to improve the security of machine learning models.
We evaluate the performance of different ML-based IoT device identification models against white box and black box attacks.
- Score: 8.33619265970446
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: IoT device identification is the process of recognizing and verifying
connected IoT devices to the network. This is an essential process for ensuring
that only authorized devices can access the network, and it is necessary for
network management and maintenance. In recent years, machine learning models
have been used widely for automating the process of identifying devices in the
network. However, these models are vulnerable to adversarial attacks that can
compromise their accuracy and effectiveness. To better secure device
identification models, discretization techniques enable reduction in the
sensitivity of machine learning models to adversarial attacks contributing to
the stability and reliability of the model. On the other hand, Ensemble methods
combine multiple heterogeneous models to reduce the impact of remaining noise
or errors in the model. Therefore, in this paper, we integrate discretization
techniques and ensemble methods and examine it on model robustness against
adversarial attacks. In other words, we propose a discretization-based ensemble
stacking technique to improve the security of our ML models. We evaluate the
performance of different ML-based IoT device identification models against
white box and black box attacks using a real-world dataset comprised of network
traffic from 28 IoT devices. We demonstrate that the proposed method enables
robustness to the models for IoT device identification.
Related papers
- LoRA-Ensemble: Efficient Uncertainty Modelling for Self-attention Networks [52.46420522934253]
We introduce LoRA-Ensemble, a parameter-efficient deep ensemble method for self-attention networks.
By employing a single pre-trained self-attention network with weights shared across all members, we train member-specific low-rank matrices for the attention projections.
Our method exhibits superior calibration compared to explicit ensembles and achieves similar or better accuracy across various prediction tasks and datasets.
arXiv Detail & Related papers (2024-05-23T11:10:32Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Heterogeneous Decentralized Machine Unlearning with Seed Model
Distillation [47.42071293545731]
Information security legislation endowed users with unconditional rights to be forgotten by trained machine learning models.
We design a decentralized unlearning framework called HDUS, which uses distilled seed models to construct erasable ensembles for all clients.
arXiv Detail & Related papers (2023-08-25T09:42:54Z) - Harris Hawks Feature Selection in Distributed Machine Learning for
Secure IoT Environments [8.690178186919635]
Internet of Things (IoT) applications can collect and transfer sensitive data.
It is necessary to develop new methods to detect hacked IoT devices.
This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks.
arXiv Detail & Related papers (2023-02-20T09:38:12Z) - Multi-Edge Server-Assisted Dynamic Federated Learning with an Optimized
Floating Aggregation Point [51.47520726446029]
cooperative edge learning (CE-FL) is a distributed machine learning architecture.
We model the processes taken during CE-FL, and conduct analytical training.
We show the effectiveness of our framework with the data collected from a real-world testbed.
arXiv Detail & Related papers (2022-03-26T00:41:57Z) - AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble
Inference Models against Adversarial Volumetric Attacks on IoT Networks [1.1172382217477126]
We present AdIoTack, a system that highlights vulnerabilities of decision trees against adversarial attacks.
To assess the model for the worst-case scenario, AdIoTack performs white-box adversarial learning to launch successful volumetric attacks.
We demonstrate how the model detects all non-adversarial volumetric attacks on IoT devices while missing many adversarial ones.
arXiv Detail & Related papers (2022-03-18T08:18:03Z) - IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device
Identification [15.672513473104031]
We propose a novel attack strategy named IoTGAN to manipulate an IoT device's traffic.
A neural network based substitute model is used to fit the target model in black-box settings.
A manipulative model is trained to add adversarial perturbations into the IoT device's traffic to evade the substitute model.
arXiv Detail & Related papers (2022-01-10T10:54:11Z) - RoFL: Attestable Robustness for Secure Federated Learning [59.63865074749391]
Federated Learning allows a large number of clients to train a joint model without the need to share their private data.
To ensure the confidentiality of the client updates, Federated Learning systems employ secure aggregation.
We present RoFL, a secure Federated Learning system that improves robustness against malicious clients.
arXiv Detail & Related papers (2021-07-07T15:42:49Z) - SafeAMC: Adversarial training for robust modulation recognition models [53.391095789289736]
In communication systems, there are many tasks, like modulation recognition, which rely on Deep Neural Networks (DNNs) models.
These models have been shown to be susceptible to adversarial perturbations, namely imperceptible additive noise crafted to induce misclassification.
We propose to use adversarial training, which consists of fine-tuning the model with adversarial perturbations, to increase the robustness of automatic modulation recognition models.
arXiv Detail & Related papers (2021-05-28T11:29:04Z) - Federated Learning for Malware Detection in IoT Devices [35.00570367521957]
A framework that uses federated learning to detect malware affecting IoT devices is presented.
N-BaIoT, a dataset modeling network traffic of several real IoT devices while affected by malware, has been used to evaluate the proposed framework.
arXiv Detail & Related papers (2021-04-15T13:14:22Z) - The Case for Retraining of ML Models for IoT Device Identification at
the Edge [0.026215338446228163]
We show how to identify IoT devices based on their network behavior using resources available at the edge of the network.
It is possible to achieve device identification and categorization with over 80% and 90% accuracy respectively at the edge.
arXiv Detail & Related papers (2020-11-17T13:01:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.