Deep Learning for Launching and Mitigating Wireless Jamming Attacks

An adversarial machine learning approach is introduced to launch jamming attacks on wireless communications and a defense strategy is presented. A cognitive transmitter uses a pre-trained classifier to predict the current channel status based on recent sensing results and decides whether to transmit or not, whereas a jammer collects channel status and ACKs to build a deep learning classifier that reliably predicts the next successful transmissions and effectively jams them. This jamming approach is shown to reduce the transmitter’s performance much more severely compared with random or sensing-based jamming. The deep learning classification scores are used by the jammer for power control subject to an average power constraint. Next, a generative adversarial network is developed for the jammer to reduce the time to collect the training dataset by augmenting it with synthetic samples. As a defense scheme, the transmitter deliberately takes a small number of wrong actions in spectrum access (in form of a causative attack against the jammer) and therefore prevents the jammer from building a reliable classifier. The transmitter systematically selects when to take wrong actions and adapts the level of defense to mislead the jammer into making prediction errors and consequently increase its throughput.

[1]  Fabio Roli,et al.  Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.

[2]  Kemal Davaslioglu,et al.  Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[3]  Timothy J. O'Shea,et al.  Applications of Machine Learning to Cognitive Radio Networks , 2007, IEEE Wireless Communications.

[4]  Yalin E. Sagduyu,et al.  Defending active learning against adversarial inputs in automated document classification , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[5]  Somesh Jha,et al.  Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.

[6]  Walid Saad,et al.  Machine Learning for Wireless Networks with Artificial Intelligence: A Tutorial on Neural Networks , 2017, ArXiv.

[7]  Hwee Pink Tan,et al.  Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.

[8]  Ekram Hossain,et al.  Machine Learning Techniques for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Kemal Davaslioglu,et al.  Generative Adversarial Learning for Spectrum Sensing , 2018, 2018 IEEE International Conference on Communications (ICC).

[10]  Dong-Ho Cho,et al.  Deep Sensing: Cooperative Spectrum Sensing Based on Convolutional Neural Networks , 2017, ArXiv.

[11]  Yalin E. Sagduyu,et al.  Evasion and causative attacks with adversarial deep learning , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[12]  Peng Ning,et al.  Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[13]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[14]  Nei Kato,et al.  Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.

[15]  Kemal Davaslioglu,et al.  Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data , 2018, 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).

[16]  Simon Osindero,et al.  Conditional Generative Adversarial Nets , 2014, ArXiv.

[17]  Kemal Davaslioglu,et al.  Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls , 2018, 2018 IEEE International Symposium on Technologies for Homeland Security (HST).

[18]  H. Vincent Poor,et al.  Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[20]  Tomas Pfister,et al.  Learning from Simulated and Unsupervised Images through Adversarial Training , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[21]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[22]  Fan Zhang,et al.  Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.

[23]  Anthony Ephremides,et al.  Jamming games in wireless networks with incomplete information , 2011, IEEE Communications Magazine.

[24]  Geoffrey Ye Li,et al.  Power of Deep Learning for Channel Estimation and Signal Detection in OFDM Systems , 2017, IEEE Wireless Communications Letters.

[25]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[26]  H. Vincent Poor,et al.  User-Centric View of Jamming Games in Cognitive Radio Networks , 2015, IEEE Transactions on Information Forensics and Security.

[27]  Geoffrey E. Hinton,et al.  Learning representations by back-propagating errors , 1986, Nature.

[28]  Kemal Davaslioglu,et al.  Vulnerability Detection and Analysis in Adversarial Deep Learning , 2018, Guide to Vulnerability Analysis for Computer Networks and Systems.

[29]  T. Charles Clancy,et al.  Convolutional Radio Modulation Recognition Networks , 2016, EANN.

[30]  Federico Chiariotti,et al.  A game-theoretic analysis of energy-depleting jamming attacks , 2019, 2017 International Conference on Computing, Networking and Communications (ICNC).

[31]  Yalin E. Sagduyu,et al.  Spectrum Data Poisoning with Adversarial Deep Learning , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).

[32]  Dong In Kim,et al.  Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks , 2015, IEEE Transactions on Cognitive Communications and Networking.

[33]  Geethapriya Thamilarasu,et al.  Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[34]  Yi Shi,et al.  How to steal a machine learning classifier with deep learning , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).

[35]  Samy Bengio,et al.  Adversarial examples in the physical world , 2016, ICLR.

[36]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[37]  Giovanni Felici,et al.  Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers , 2013, Int. J. Secur. Networks.

[38]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[39]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[40]  Ursula Challita,et al.  Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial , 2017, IEEE Communications Surveys & Tutorials.