Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification (2201.03281v2)

Published 10 Jan 2022 in cs.CR, cs.LG, and cs.NI

Abstract: With the proliferation of IoT devices, researchers have developed a variety of IoT device identification methods with the assistance of machine learning. Nevertheless, the security of these identification methods mostly depends on collected training data. In this research, we propose a novel attack strategy named IoTGAN to manipulate an IoT device's traffic such that it can evade machine learning based IoT device identification. In the development of IoTGAN, we have two major technical challenges: (i) How to obtain the discriminative model in a black-box setting, and (ii) How to add perturbations to IoT traffic through the manipulative model, so as to evade the identification while not influencing the functionality of IoT devices. To address these challenges, a neural network based substitute model is used to fit the target model in black-box settings, it works as a discriminative model in IoTGAN. A manipulative model is trained to add adversarial perturbations into the IoT device's traffic to evade the substitute model. Experimental results show that IoTGAN can successfully achieve the attack goals. We also develop efficient countermeasures to protect machine learning based IoT device identification from been undermined by IoTGAN.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (26)
  1. “Internet of things,” https://en.wikipedia.org/wiki/Internet_of_things, 2021.
  2. Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wireless spoofing attacks,” in IEEE Communications Society Conference on sensor, mesh and ad hoc communications and networks, 2007.
  3. Y. Shi, K. Davaslioglu, and Y. E. Sagduyu, “Generative adversarial network in the air: Deep adversarial learning for wireless signal spoofing,” IEEE Transactions on Cognitive Communications and Networking, 2020.
  4. N. Ammar, L. Noirie, and S. Tixeuil, “Network-protocol-based iot device identification,” in IEEE FMEC, 2019.
  5. N. Yousefnezhad, A. Malhi, and K. Främling, “Automated iot device identification based on full packet information using real-time network traffic,” Sensors.
  6. A. Sivanathan, D. Sherratt, H. H. Gharakheili, A. Radford, C. Wijenayake, A. Vishwanath, and V. Sivaraman, “Characterizing and classifying iot traffic in smart cities and campuses,” in IEEE Conference on Computer Communications Workshops (IEEE INFOCOM WKSHPS), 2017.
  7. S. Marchal, M. Miettinen, T. D. Nguyen, A.-R. Sadeghi, and N. Asokan, “Audi: Toward autonomous iot device-type identification using periodic communication,” IEEE Journal on Selected Areas in Communications, 2019.
  8. A. Aksoy and M. H. Gunes, “Automated iot device identification using network traffic,” in IEEE International Conference on Communications (ICC), 2019.
  9. T. Hou, Z. Qu, T. Wang, Z. Lu, and Y. Liu, “Proto: Proactive topology obfuscation against adversarial network topology inference,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications.   IEEE, 2020, pp. 1598–1607.
  10. T. Hou, T. Wang, Z. Lu, and Y. Liu, “Combating adversarial network topology inference by proactive topology obfuscation,” IEEE/ACM Transactions on Networking, 2021.
  11. A. Sivanathan, H. Habibi Gharakheili, and V. Sivaraman, “Managing iot cyber-security using programmable telemetry and machine learning,” IEEE TNSM, 2020.
  12. J. Kotak and Y. Elovici, “Iot device identification using deep learning,” in Computational Intelligence in Security for Information Systems Conference.   Springer, 2019.
  13. J. Bao, B. Hamdaoui, and W.-K. Wong, “Iot device type identification using hybrid deep learning approach for increased iot security,” in International Wireless Communications and Mobile Computing, 2020.
  14. S. Leroux, S. Bohez, P.-J. Maenhaut, N. Meheus, P. Simoens, and B. Dhoedt, “Fingerprinting encrypted network traffic types using machine learning,” in NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium.   IEEE, 2018.
  15. T. Hou, T. Wang, Z. Lu, and Y. Liu, “Smart spying via deep learning: inferring your activities from encrypted wireless traffic,” in IEEE GlobalSIP, 2019.
  16. I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” Advances in neural information processing systems, 2014.
  17. N. Papernot, P. McDaniel, and I. Goodfellow, “Transferability in machine learning: from phenomena to black-box attacks using adversarial samples,” arXiv preprint arXiv:1605.07277, 2016.
  18. C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, “Intriguing properties of neural networks,” arXiv preprint arXiv:1312.6199, 2013.
  19. Y. Sagduyu, Y. Shi, and T. Erpek, “Adversarial deep learning for over-the-air spectrum poisoning attacks,” IEEE Transactions on Mobile Computing, 2019.
  20. T. Wang, Y. Liu, Q. Pei, and T. Hou, “Location-restricted services access control leveraging pinpoint waveforming,” in ACM Conference on Computer and Communications Security, 2015.
  21. T. Wang, Y. Liu, T. Hou, Q. Pei, and S. Fang, “Signal entanglement based pinpoint waveforming for location-restricted service access control,” IEEE Transactions on Dependable and Secure Computing, 2016.
  22. Y. Liu and P. Ning, “Enhanced wireless channel authentication using time-synched link signature,” in IEEE INFOCOM, 2012.
  23. N. Patwari and S. K. Kasera, “Temporal link signature measurements for location distinction,” IEEE Transactions on Mobile Computing, vol. 10, no. 3, pp. 449–462, 2011.
  24. A. Sivanathan, H. H. Gharakheili, F. Loi, A. Radford, C. Wijenayake, A. Vishwanath, and V. Sivaraman, “Classifying iot devices in smart environments using network traffic characteristics,” IEEE TMC, 2018.
  25. R. K. Singh, S. Dalal, V. K. Chauhan, and D. Kumar, “Optimization of far in intrusion detection system by using random forest algorithm,” in International Conference on Advanced Computing and Software Engineering, 2019.
  26. D. Halperin, W. Hu, A. Sheth, and D. Wetherall, “Tool release: Gathering 802.11 n traces with channel state information,” ACM Computer Communication Review, 2011.
Citations (9)

Summary

We haven't generated a summary for this paper yet.