{"title":"Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards","authors":"Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan","doi":"10.1007/s10207-024-00834-y","DOIUrl":null,"url":null,"abstract":"<p>Due to its plug-and-play functionality and wide device support, the universal serial bus (USB) protocol has become one of the most widely used protocols. However, this widespread adoption has introduced a significant security concern: the implicit trust provided to USB devices, which has created a vast array of attack vectors. Malicious USB devices exploit this trust by disguising themselves as benign peripherals and covertly implanting malicious commands into connected host devices. Existing research employs supervised learning models to identify such malicious devices, but our study reveals a weakness in these models when faced with sophisticated data poisoning attacks. We propose, design and implement a sophisticated adversarial data poisoning attack to demonstrate how these models can be manipulated to misclassify an attack device as a benign device. Our method entails generating keystroke data using a microprogrammable keystroke attack device. We develop adversarial attacker by meticulously analyzing the data distribution of data features generated via USB keyboards from benign users. The initial training data is modified by exploiting firmware-level modifications within the attack device. Upon evaluating the models, our findings reveal a significant decrease from 99 to 53% in detection accuracy when an adversarial attacker is employed. This work highlights the critical need to reevaluate the dependability of machine learning-based USB threat detection mechanisms in the face of increasingly sophisticated attack methods. The vulnerabilities demonstrated highlight the importance of developing more robust and resilient detection strategies to protect against the evolution of malicious USB devices.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"21 1","pages":""},"PeriodicalIF":2.4000,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10207-024-00834-y","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Due to its plug-and-play functionality and wide device support, the universal serial bus (USB) protocol has become one of the most widely used protocols. However, this widespread adoption has introduced a significant security concern: the implicit trust provided to USB devices, which has created a vast array of attack vectors. Malicious USB devices exploit this trust by disguising themselves as benign peripherals and covertly implanting malicious commands into connected host devices. Existing research employs supervised learning models to identify such malicious devices, but our study reveals a weakness in these models when faced with sophisticated data poisoning attacks. We propose, design and implement a sophisticated adversarial data poisoning attack to demonstrate how these models can be manipulated to misclassify an attack device as a benign device. Our method entails generating keystroke data using a microprogrammable keystroke attack device. We develop adversarial attacker by meticulously analyzing the data distribution of data features generated via USB keyboards from benign users. The initial training data is modified by exploiting firmware-level modifications within the attack device. Upon evaluating the models, our findings reveal a significant decrease from 99 to 53% in detection accuracy when an adversarial attacker is employed. This work highlights the critical need to reevaluate the dependability of machine learning-based USB threat detection mechanisms in the face of increasingly sophisticated attack methods. The vulnerabilities demonstrated highlight the importance of developing more robust and resilient detection strategies to protect against the evolution of malicious USB devices.
由于其即插即用的功能和广泛的设备支持,通用串行总线(USB)协议已成为使用最广泛的协议之一。然而,这种广泛的应用带来了一个重大的安全隐患:USB 设备所具有的隐含信任,产生了大量的攻击载体。恶意 USB 设备利用这种信任,将自己伪装成良性外设,并暗中向连接的主机设备植入恶意命令。现有研究采用监督学习模型来识别此类恶意设备,但我们的研究揭示了这些模型在面对复杂的数据中毒攻击时的弱点。我们提出、设计并实施了一种复杂的对抗性数据中毒攻击,以演示如何操纵这些模型,将攻击设备错误分类为良性设备。我们的方法需要使用微可编程按键攻击设备生成按键数据。我们通过对良性用户的 USB 键盘生成的数据特征的数据分布进行细致分析,从而开发出对抗攻击器。初始训练数据是通过利用攻击设备内的固件级修改进行修改的。在对模型进行评估后,我们的研究结果表明,当采用对抗攻击者时,检测准确率从 99% 显著下降到 53%。这项工作强调,面对日益复杂的攻击方法,亟需重新评估基于机器学习的 USB 威胁检测机制的可靠性。所展示的漏洞凸显了开发更强大、更有弹性的检测策略以防范恶意 USB 设备演变的重要性。
期刊介绍:
The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.
Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: watermarking, software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility.