恶意软件
计算机科学
对抗制
钥匙(锁)
探测器
物联网
计算机安全
复杂度
过程(计算)
遗传算法
算法
数据挖掘
机器学习
人工智能
操作系统
电信
社会科学
社会学
作者
Peng Yuan,Shanshan Wang,Chuan Zhao,Wenyue Wang,Daokuan Bai,Lizhi Peng,Zhenxiang Chen
标识
DOI:10.1109/icc45041.2023.10279299
摘要
The exponential growth and sophistication of Internet of Things (IoT) malware behavior have resulted in new detection technologies capable of defending IoT devices against some threats. However, their success has stimulated the interest of attackers attempting to circumvent current IoT malware detectors. Among detection technologies, the detectors trained based on Uniform Resource Locator (URL) requests have become popular. To draw attention to the safety of the detectors, we propose a grey-box method to attack detectors based on URL requests without breaking malicious functions of URL requests. The key idea is to add perturbations to the tail of URLs. Specifically, this method is based on a Genetic Algorithm (GA) to find suitable perturbations and optimizes the process of adversarial attacks through a dynamic number of evolution directions and a maximum generation limit. The effectiveness of our adversarial attack is demonstrated by experimental results based on a widely used public dataset CSIC2010 and several representative detectors. As far as we know, this is the first time an adversarial attack against IoT detectors based on URL requests has been done. The method has an attack success rate of more than 92 %. Furthermore, experiment results show that the method can reduce query numbers while maintaining the attack success rate.
科研通智能强力驱动
Strongly Powered by AbleSci AI