Backdoor Attack and Defense Methods for AI–Based IoT Intrusion Detection System

IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Bowen Ma, Jiangwei Shi, Ning Zhu, Chen Fang, Yongjin Hu
{"title":"Backdoor Attack and Defense Methods for AI–Based IoT Intrusion Detection System","authors":"Bowen Ma,&nbsp;Jiangwei Shi,&nbsp;Ning Zhu,&nbsp;Chen Fang,&nbsp;Yongjin Hu","doi":"10.1049/ise2/6664900","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) is an emerging technology that has attracted significant attention and triggered a technical revolution in recent years. Numerous IoT devices are directly connected to the physical world, such as security cameras and medical equipment, making IoT security a critical issue. Artificial intelligence (AI) based intrusion detection technology for IoT can rapidly detect network attacks and improve security performance. However, this technology is vulnerable to backdoor attacks. As an important form of adversarial machine learning (ML), backdoor attacks can allow malicious traffic to evade detection of the intrusion detection system, posing a significant threat to the IoT security. This study focuses on backdoor attack and defense methods for AI–based IoT intrusion detection system. Specifically, we first use different ML and deep learning (DL) classification models to classify IoT traffic data, thereby achieving intrusion detection within IoT. Additionally, we employ data poisoning techniques to implant backdoors into models, enabling backdoor attacks on classification models. For backdoor defense, we propose backdoor detection and mitigate methods: (1) The proposed backdoor detection method is achieved by leveraging the strong correlation between the backdoor trigger and the target classification; (2) we utilize the unlearning method to mitigate the backdoor effect, enhancing the robustness of classification networks. Extensive experiments were conducted on the CICIOT2023 dataset to evaluate the effectiveness of IoT intrusion detection, backdoor attack, and defense.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6000,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/6664900","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Information Security","FirstCategoryId":"94","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ise2/6664900","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) is an emerging technology that has attracted significant attention and triggered a technical revolution in recent years. Numerous IoT devices are directly connected to the physical world, such as security cameras and medical equipment, making IoT security a critical issue. Artificial intelligence (AI) based intrusion detection technology for IoT can rapidly detect network attacks and improve security performance. However, this technology is vulnerable to backdoor attacks. As an important form of adversarial machine learning (ML), backdoor attacks can allow malicious traffic to evade detection of the intrusion detection system, posing a significant threat to the IoT security. This study focuses on backdoor attack and defense methods for AI–based IoT intrusion detection system. Specifically, we first use different ML and deep learning (DL) classification models to classify IoT traffic data, thereby achieving intrusion detection within IoT. Additionally, we employ data poisoning techniques to implant backdoors into models, enabling backdoor attacks on classification models. For backdoor defense, we propose backdoor detection and mitigate methods: (1) The proposed backdoor detection method is achieved by leveraging the strong correlation between the backdoor trigger and the target classification; (2) we utilize the unlearning method to mitigate the backdoor effect, enhancing the robustness of classification networks. Extensive experiments were conducted on the CICIOT2023 dataset to evaluate the effectiveness of IoT intrusion detection, backdoor attack, and defense.

Abstract Image

基于人工智能的物联网入侵检测系统后门攻击与防御方法
物联网(Internet of Things, IoT)是近年来备受关注并引发一场技术革命的新兴技术。许多物联网设备直接连接到物理世界,如安全摄像头和医疗设备,使物联网安全成为一个关键问题。基于人工智能(AI)的物联网入侵检测技术可以快速检测网络攻击,提高安全性能。然而,这种技术很容易受到后门攻击。作为对抗性机器学习(ML)的一种重要形式,后门攻击可以让恶意流量逃避入侵检测系统的检测,对物联网安全构成重大威胁。本文主要研究基于人工智能的物联网入侵检测系统的后门攻击与防御方法。具体来说,我们首先使用不同的ML和深度学习(DL)分类模型对物联网流量数据进行分类,从而实现物联网内的入侵检测。此外,我们使用数据中毒技术将后门植入模型中,从而对分类模型进行后门攻击。对于后门防御,我们提出了后门检测和缓解方法:(1)利用后门触发与目标分类之间的强相关性实现后门检测方法;(2)利用非学习方法减轻了后门效应,增强了分类网络的鲁棒性。在CICIOT2023数据集上进行了大量实验,以评估物联网入侵检测、后门攻击和防御的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Information Security
IET Information Security 工程技术-计算机:理论方法
CiteScore
3.80
自引率
7.10%
发文量
47
审稿时长
8.6 months
期刊介绍: IET Information Security publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls. Scope: Access Control and Database Security Ad-Hoc Network Aspects Anonymity and E-Voting Authentication Block Ciphers and Hash Functions Blockchain, Bitcoin (Technical aspects only) Broadcast Encryption and Traitor Tracing Combinatorial Aspects Covert Channels and Information Flow Critical Infrastructures Cryptanalysis Dependability Digital Rights Management Digital Signature Schemes Digital Steganography Economic Aspects of Information Security Elliptic Curve Cryptography and Number Theory Embedded Systems Aspects Embedded Systems Security and Forensics Financial Cryptography Firewall Security Formal Methods and Security Verification Human Aspects Information Warfare and Survivability Intrusion Detection Java and XML Security Key Distribution Key Management Malware Multi-Party Computation and Threshold Cryptography Peer-to-peer Security PKIs Public-Key and Hybrid Encryption Quantum Cryptography Risks of using Computers Robust Networks Secret Sharing Secure Electronic Commerce Software Obfuscation Stream Ciphers Trust Models Watermarking and Fingerprinting Special Issues. Current Call for Papers: Security on Mobile and IoT devices - https://digital-library.theiet.org/files/IET_IFS_SMID_CFP.pdf
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信