Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things

Husnain Rafiq, Nauman Aslam, Usman Ahmed, Jerry Chun-Wei Lin

Research output: Contribution to journalArticlepeer-review

12 Citations (Scopus)
102 Downloads (Pure)

Abstract

With advanced 5 G/6 G networks, data-driven interconnected devices will increase exponentially. As a result, the Industrial Internet of Things (IIoT) requires data secure information extraction to apply digital services, medical diagnoses and financial forecasting. This introduction of high-speed network mobile applications will also adapt. As a consequence, the scale and complexity of Android malware are rising. Detection of malware classification vulnerable to attacks. A fabricate feature can force misclassification to produce the desired output. This study proposes a subset feature selection method to evade fabricated attacks in the IIOT environment. The method extracts application-aware features from a single android application to train an independent classification model. Ensemble-based learning is then used to train the distinct classification models. Finally, the collaborative ML classifier makes independent decisions to fight against adversarial evasion attacks. We compare and evaluate the benchmark Android malware dataset. The proposed method achieved 91% accuracy with 14 fabricated input features.
Original languageEnglish
Pages (from-to)960-968
Number of pages9
JournalIEEE Transactions on Industrial Informatics
Volume19
Issue number1
Early online date7 Jul 2022
DOIs
Publication statusPublished - 1 Jan 2023

Keywords

  • Adversarial attacks
  • Analytical models
  • Feature extraction
  • Industrial Internet of Things
  • Malware
  • Object recognition
  • Smart phones
  • Static analysis
  • android
  • industrial internet of things (IIoT)
  • malware

Fingerprint

Dive into the research topics of 'Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things'. Together they form a unique fingerprint.

Cite this