• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网安全系统中的对抗性机器学习路线图

Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems.

作者信息

Harbi Yasmine, Medani Khedidja, Gherbi Chirihane, Aliouat Zibouda, Harous Saad

机构信息

LRSD Laboratory, Ferhat Abbas University Setif-1, Setif 19000, Algeria.

Arabic Literature and Language Department, Mohamed Lamine Debaghine University Setif-2, Setif 19000, Algeria.

出版信息

Sensors (Basel). 2024 Aug 9;24(16):5150. doi: 10.3390/s24165150.

DOI:10.3390/s24165150
PMID:39204846
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11359573/
Abstract

Machine learning (ML) represents one of the main pillars of the current digital era, specifically in modern real-world applications. The Internet of Things (IoT) technology is foundational in developing advanced intelligent systems. The convergence of ML and IoT drives significant advancements across various domains, such as making IoT-based security systems smarter and more efficient. However, ML-based IoT systems are vulnerable to lurking attacks during the training and testing phases. An adversarial attack aims to corrupt the ML model's functionality by introducing perturbed inputs. Consequently, it can pose significant risks leading to devices' malfunction, services' interruption, and personal data misuse. This article examines the severity of adversarial attacks and accentuates the importance of designing secure and robust ML models in the IoT context. A comprehensive classification of adversarial machine learning (AML) is provided. Moreover, a systematic literature review of the latest research trends (from 2020 to 2024) of the intersection of AML and IoT-based security systems is presented. The results revealed the availability of various AML attack techniques, where the Fast Gradient Signed Method (FGSM) is the most employed. Several studies recommend the adversarial training technique to defend against such attacks. Finally, potential open issues and main research directions are highlighted for future consideration and enhancement.

摘要

机器学习(ML)是当前数字时代的主要支柱之一,尤其在现代实际应用中。物联网(IoT)技术是开发先进智能系统的基础。ML与IoT的融合推动了各个领域的重大进步,例如使基于物联网的安全系统更智能、更高效。然而,基于ML的物联网系统在训练和测试阶段容易受到潜在攻击。对抗性攻击旨在通过引入干扰输入来破坏ML模型的功能。因此,它可能带来重大风险,导致设备故障、服务中断和个人数据滥用。本文研究了对抗性攻击的严重性,并强调了在物联网环境中设计安全、健壮的ML模型的重要性。提供了对抗性机器学习(AML)的全面分类。此外,还对AML与基于物联网的安全系统交叉领域的最新研究趋势(2020年至2024年)进行了系统的文献综述。结果显示了各种AML攻击技术的存在,其中快速梯度符号法(FGSM)是使用最广泛的。多项研究推荐采用对抗性训练技术来抵御此类攻击。最后,强调了潜在的开放问题和主要研究方向,以供未来考虑和改进。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/b0b0219a4e71/sensors-24-05150-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/514dedc6ac07/sensors-24-05150-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/cf4b5cf3cf02/sensors-24-05150-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/b25fdbff56b0/sensors-24-05150-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/89d5c18e05d4/sensors-24-05150-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/2982a61316a8/sensors-24-05150-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/c102a883d564/sensors-24-05150-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/3e4befed9f03/sensors-24-05150-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/b0b0219a4e71/sensors-24-05150-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/514dedc6ac07/sensors-24-05150-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/cf4b5cf3cf02/sensors-24-05150-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/b25fdbff56b0/sensors-24-05150-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/89d5c18e05d4/sensors-24-05150-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/2982a61316a8/sensors-24-05150-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/c102a883d564/sensors-24-05150-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/3e4befed9f03/sensors-24-05150-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/84a8/11359573/b0b0219a4e71/sensors-24-05150-g008.jpg

相似文献

1
Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems.物联网安全系统中的对抗性机器学习路线图
Sensors (Basel). 2024 Aug 9;24(16):5150. doi: 10.3390/s24165150.
2
RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic.RobEns:用于保护物联网流量的鲁棒集成对抗机器学习框架。
Sensors (Basel). 2024 Apr 19;24(8):2626. doi: 10.3390/s24082626.
3
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).捍卫防御者:基于对抗学习的防御策略,用于网络物理系统 (CPS) 中的基于学习的安全方法。
Sensors (Basel). 2023 Jun 9;23(12):5459. doi: 10.3390/s23125459.
4
Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence.基于人工智能的物联网安全挑战及其解决方案分析
Brain Sci. 2023 Apr 19;13(4):683. doi: 10.3390/brainsci13040683.
5
Adversarial Samples on Android Malware Detection Systems for IoT Systems.对抗样本对物联网系统中 Android 恶意软件检测系统的影响。
Sensors (Basel). 2019 Feb 25;19(4):974. doi: 10.3390/s19040974.
6
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.基于软件定义网络的一对多策略,用于检测和缓解智能家居物联网设备中的分布式拒绝服务攻击
Sensors (Basel). 2024 Aug 3;24(15):5022. doi: 10.3390/s24155022.
7
Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends.用于物联网网络异常检测的机器学习和深度学习技术——当前研究趋势
Sensors (Basel). 2024 Mar 20;24(6):1968. doi: 10.3390/s24061968.
8
BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning.增强集成机器学习的物联网系统网络攻击检测高效技术:BoostedEnML
Sensors (Basel). 2022 Sep 29;22(19):7409. doi: 10.3390/s22197409.
9
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.雾计算环境下物联网应用中大数据的安全性:一项调查。
Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788.
10
TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.TLTD:基于学习的物联网流量检测系统的测试框架。
Sensors (Basel). 2018 Aug 10;18(8):2630. doi: 10.3390/s18082630.

本文引用的文献

1
RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic.RobEns:用于保护物联网流量的鲁棒集成对抗机器学习框架。
Sensors (Basel). 2024 Apr 19;24(8):2626. doi: 10.3390/s24082626.
2
A Systematic Literature Review of Blockchain Technology for Internet of Drones Security.用于无人机物联网安全的区块链技术的系统文献综述
Arab J Sci Eng. 2023;48(2):1053-1074. doi: 10.1007/s13369-022-07380-6. Epub 2022 Oct 31.
3
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses.机器学习中的数据集安全:数据投毒、后门攻击及防御
IEEE Trans Pattern Anal Mach Intell. 2023 Feb;45(2):1563-1580. doi: 10.1109/TPAMI.2022.3162397. Epub 2023 Jan 6.