Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things

With advanced 5G/6G networks, data-driven interconnected devices will increase exponentially. As a result, the Industrial Internet of Things (IIoT) requires data secure information extraction to apply digital services, medical diagnoses, and financial forecasting. This introduction of high-speed network mobile applications will also adapt. As a consequence, the scale and complexity of Android malware are rising. Detection of malware classification is vulnerable to attacks. A fabricated feature can force misclassification to produce the desired output. This article proposes a subset feature selection method to evade fabricated attacks in the IIoT environment. The method extracts application-aware features from a single android application to train an independent classification model. Ensemble-based learning is then used to train the distinct classification models. Finally, the collaborative ML classifier makes independent decisions to fight against adversarial evasion attacks. We compare and evaluate the benchmark Android malware dataset. The proposed method achieved 91% accuracy with 14 fabricated input features.

[1]  Young-Sik Jeong,et al.  Hybrid Malware Detection Based on Bi-LSTM and SPP-Net for Smart IoT , 2022, IEEE Transactions on Industrial Informatics.

[2]  Gautam Srivastava,et al.  Mitigating adversarial evasion attacks of ransomware using ensemble learning , 2022, Comput. Electr. Eng..

[3]  Robert H. Deng,et al.  Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things , 2021, IEEE Transactions on Industrial Informatics.

[4]  Amit Dvir,et al.  Evasion Is Not Enough: A Case Study of Android Malware , 2020, CSCML.

[5]  Miao Zhang,et al.  A Review of Android Malware Detection Approaches Based on Machine Learning , 2020, IEEE Access.

[6]  Yong Fan,et al.  A Systematic Literature Review of Android Malware Detection Using Static Analysis , 2020, IEEE Access.

[7]  Tiago Cruz,et al.  Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review , 2020, IEEE Access.

[8]  Usman Ahmed,et al.  IMIAD: Intelligent Malware Identification for Android Platform , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).

[9]  Eul Gyu Im,et al.  A Multimodal Deep Learning Method for Android Malware Detection Using Various Features , 2019, IEEE Transactions on Information Forensics and Security.

[10]  Xiaojiang Du,et al.  Adversarial Samples on Android Malware Detection Systems for IoT Systems , 2019, Sensors.

[11]  Anshul Arora,et al.  Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning , 2018, MobiCom.

[12]  Xiao Chen,et al.  Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection , 2018, IEEE Transactions on Information Forensics and Security.

[13]  Juan E. Tapiador,et al.  Picking on the family: Disrupting android malware triage by forcing misclassification , 2018, Expert Syst. Appl..

[14]  Yuval Elovici,et al.  Quantifying the resilience of machine learning classifiers used for cyber security , 2018, Expert Syst. Appl..

[15]  Mahmoud M. Hammad,et al.  Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware , 2018, ACM Transactions on Software Engineering and Methodology.

[16]  Patrick D. McDaniel,et al.  Adversarial Examples for Malware Detection , 2017, ESORICS.

[17]  Jun Sun,et al.  Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique , 2017, IEEE Transactions on Information Forensics and Security.

[18]  P Ravi Kiran Varma,et al.  Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[19]  Randal S. Olson,et al.  TPOT: A Tree-based Pipeline Optimization Tool for Automating Machine Learning , 2016, AutoML@ICML.

[20]  Sakir Sezer,et al.  Dynalog: an automated dynamic analysis framework for characterizing android applications , 2016, 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security).

[21]  Qingshan Jiang,et al.  Feature selection via maximizing global information gain for text classification , 2013, Knowl. Based Syst..

[22]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[23]  Richard Lippmann,et al.  Machine learning in adversarial environments , 2010, Machine Learning.

[24]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[25]  Konrad Rieck,et al.  DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.

[26]  Zhenlong Yuan,et al.  Droid-Sec: Deep Learning in Android Malware Detection , 2014 .