CQUniversity
Browse
- No file added yet -

Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications

This item contains files with download restrictions
Version 2 2024-08-26, 19:58
Version 1 2023-02-01, 01:59
journal contribution
posted on 2024-08-26, 19:58 authored by MD Mamunur RashidMD Mamunur Rashid, J Kamruzzaman, M Mehedi Hassan, Tasadduq ImamTasadduq Imam, Santoso WibowoSantoso Wibowo, Steven GordonSteven Gordon, G Fortino
Intrusion Detection Systems (IDS) based on deep learning models can identify and mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models, which support the IDS's decision, could be vulnerable to a cyberattack known as adversarial attack. In this type of attack, attackers create adversarial samples by introducing small perturbations to attack samples to trick a trained model into misclassifying them as benign applications. These attacks can cause substantial damage to IoT-based smart city models in terms of device malfunction, data leakage, operational outage and financial loss. To our knowledge, the impact of and defence against adversarial attacks on IDS models in relation to smart city applications have not been investigated yet. To address this research gap, in this work, we explore the effect of adversarial attacks on the deep learning and shallow machine learning models by using a recent IoT dataset and propose a method using adversarial retraining that can significantly improve IDS performance when confronting adversarial attacks. Simulation results demonstrate that the presence of adversarial samples deteriorates the detection accuracy significantly by above 70% while our proposed model can deliver detection accuracy above 99% against all types of attacks including adversarial attacks. This makes an IDS robust in protecting IoT-based smart city services.

History

Volume

120

Start Page

1

End Page

13

Number of Pages

13

eISSN

1872-6208

ISSN

0167-4048

Publisher

Elsevier BV

Additional Rights

CC BY NC ND (AAM)

Language

en

Peer Reviewed

  • Yes

Open Access

  • Yes

Acceptance Date

2022-06-01

External Author Affiliations

Federation University Australia, King Saud University, University of Calabria

Author Research Institute

  • Centre for Intelligent Systems

Era Eligible

  • Yes

Journal

Computers and Security

Article Number

102783

Usage metrics

    CQUniversity

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC