Abstract
Internet of Things (IoT) has become widely adopted in many fields, including industry, social networks, health care, and smart homes, connecting billions of IoT devices through the internet. Understanding and studying IoT malware through analysis using various approaches, such as Control Flow Graph (CFG)-based features and then applying deep learning detection, are widely explored. In this study, we investigate the robustness of such models against adversarial attacks. Our approach crafts the adversarial IoT software using the Subgraph Embedding and Augmentation (SGEA) method that reduces the embedded size required to cause misclassification. Intensive experiments are conducted to evaluate the performance of the proposed method. We observed that SGEA approach is able to misclassify all IoT malware samples as benign by embedding an average size of 6.8 nodes. This highlights that the current detection systems are prone to adversarial examples attacks; thus, there is a need to build more robust systems to detect such manipulated features generated by adversarial examples.
Original language | English |
---|---|
Title of host publication | Computational Data and Social Networks - 8th International Conference, CSoNet 2019, Proceedings |
Editors | Andrea Tagarelli, Hanghang Tong |
Publisher | Springer |
Pages | 268-281 |
Number of pages | 14 |
ISBN (Print) | 9783030349790 |
DOIs | |
State | Published - 2019 |
Event | 8th International Conference on Computational Data and Social Networks, CSoNet 2019 - Ho Chi Minh City, Viet Nam Duration: 18 Nov 2019 → 20 Nov 2019 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 11917 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 8th International Conference on Computational Data and Social Networks, CSoNet 2019 |
---|---|
Country/Territory | Viet Nam |
City | Ho Chi Minh City |
Period | 18/11/19 → 20/11/19 |
Bibliographical note
Publisher Copyright:© Springer Nature Switzerland AG 2019.
Keywords
- Adversarial learning
- Graph embedding
- IoT malware detection