Prasad Kashi Sai, Udayakumar P, Laxmi Lydia E, Ahmed Mohammed Altaf, Ishak Mohamad Khairi, Karim Faten Khalid, Mostafa Samih M
Department of CSE-AI&ML, MLR Institute of Technology, Hyderabad, India.
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatore, India.
Sci Rep. 2025 Jan 17;15(1):2235. doi: 10.1038/s41598-025-85878-3.
Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. As IoT, AI, and 5G endure to unite and understand the potential of Industry 4.0, security events and incidents on IoT systems have been enlarged. While IoT networks efficiently deliver intellectual services, the vast amount of data processed and collected in IoT networks also creates severe security concerns. Numerous research works were keen to project intelligent network intrusion detection systems (NIDS) to avert the exploitation of IoT data through smart applications. Deep learning (DL) models are applied to perceive and alleviate numerous security attacks against IoT networks. DL has a considerable reputation in NIDS, owing to its robust ability to identify delicate differences between malicious and normal network activities. While a diversity of models are aimed at influencing DL techniques for security protection, whether these methods are exposed to adversarial examples is unidentified. This study introduces a Two-Tier Optimization Strategy for Robust Adversarial Attack Mitigation in (TTOS-RAAM) model for IoT network security. The major aim of the TTOS-RAAM technique is to recognize the presence of adversarial attack behaviour in the IoT. Primarily, the TTOS-RAAM technique utilizes a min-max scaler to scale the input data into a uniform format. Besides, a hybrid of the coati-grey wolf optimization (CGWO) approach is utilized for optimum feature selection. Moreover, the TTOS-RAAM technique employs the conditional variational autoencoder (CVAE) technique to detect adversarial attacks. Finally, the parameter adjustment of the CVAE model is performed by utilizing an improved chaos African vulture optimization (ICAVO) model. A wide range of experimentation analyses is performed and the outcomes are observed under numerous aspects using the RT-IoT2022 dataset. The performance validation of the TTOS-RAAM technique portrayed a superior accuracy value of 99.91% over existing approaches.
对抗攻击在计算机视觉(CV)中已被广泛研究,但其对网络安全应用的影响仍处于开放研究领域。随着物联网(IoT)、人工智能(AI)和5G不断融合并挖掘工业4.0的潜力,物联网系统上的安全事件和事故有所增加。虽然物联网网络高效地提供智能服务,但在物联网网络中处理和收集的大量数据也引发了严重的安全问题。许多研究致力于设计智能网络入侵检测系统(NIDS),以防止通过智能应用程序对物联网数据的利用。深度学习(DL)模型被应用于感知和缓解针对物联网网络的多种安全攻击。由于DL能够强大地识别恶意和正常网络活动之间的细微差异,因此在NIDS中享有很高的声誉。虽然有多种模型旨在利用DL技术进行安全保护,但这些方法是否容易受到对抗样本的影响尚不清楚。本研究针对物联网网络安全,引入了一种用于稳健对抗攻击缓解的双层优化策略(TTOS - RAAM)模型。TTOS - RAAM技术的主要目标是识别物联网中对抗攻击行为的存在。首先,TTOS - RAAM技术利用最小 - 最大缩放器将输入数据缩放到统一格式。此外,采用了一种结合了卷尾猴 - 灰狼优化(CGWO)方法的混合算法进行最优特征选择。此外,TTOS - RAAM技术采用条件变分自编码器(CVAE)技术来检测对抗攻击。最后,利用改进的混沌非洲秃鹫优化(ICAVO)模型对CVAE模型进行参数调整。使用RT - IoT2022数据集进行了广泛的实验分析,并从多个方面观察了结果。TTOS - RAAM技术的性能验证表明,其准确率高达99.91%,优于现有方法。