Open Access
Siddhant Sukhatankar,
- Software Development Engineer–Artificial Intelligence & Machine Learning (AI/ML), Demand Science Optimization Organization, Amazon, Arlington, Virginia, United States
Abstract
As the Internet of Things (IoT) devices and wireless communication networks continue to grow rapidly, protecting systems from cyber threats has become increasingly important. Machine learning–based intrusion detection systems (IDS) have shown strong potential in detecting abnormal and malicious network activities, yet their effectiveness and resilience when facing adversarial attacks are still not sufficiently explored. This research evaluates Machine Learning (ML) models–XGBoost, random forest, and multi-layer perceptron (MLP)—in detecting attacks within wireless IoT networks when subjected to certain specific traffic feature perturbations. Using the CICIoT2023 and IoT intrusion datasets, we conducted binary classification experiments distinguishing benign and attack traffic. Perturbations simulating realistic adversarial manipulations were applied to numeric features at multiple levels (5%, 10%, and 25%). The results demonstrate that tree-based models, XGBoost, and random forest maintain high recall under perturbation, with less than 0.2% reduction at even the highest perturbation levels, whereas MLP performance is unstable on imbalanced data. Feature importance analysis reveals that timing and protocol-related features contribute significantly to model predictions. These findings highlight the robustness of ensemble tree methods in practical IoT intrusion detection scenarios and emphasize the need for perturbation-aware evaluations for ML-based IDS. The study contributes to safer deployment of wireless IDS and provides a methodological framework for assessing model resilience against adversarial feature modifications.
Keywords: Adversarial perturbations, IoT security, machine learning, random forest, wireless intrusion detection, XGBoost
[This article belongs to International Journal of Wireless Security and Networks ]
Siddhant Sukhatankar. Assessing the Robustness of Machine Learning Models for Wireless Intrusion Detection Under Adversarial Traffic Perturbations. International Journal of Wireless Security and Networks. 2026; 04(01):29-34.
Siddhant Sukhatankar. Assessing the Robustness of Machine Learning Models for Wireless Intrusion Detection Under Adversarial Traffic Perturbations. International Journal of Wireless Security and Networks. 2026; 04(01):29-34. Available from: https://journals.stmjournals.com/ijwsn/article=2026/view=236202
References
- Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M. A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutor. 2020;22(3):1646–1685. doi:10.1109/COMST.2020.2988293.
- Kumari P, Jain AK. A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput Secur. 2023;127:103096. doi:10.1016/j.cose.2023.103096.
- Bankó MB, Dyszewski S, Králová M, Limpek MB, Papaioannou M, Choudhary G, et al. Advancements in machine learning-based intrusion detection in IoT: research trends and challenges. Algorithms. 2025;18(4):209. doi:10.3390/a18040209.
- Liu N, Li C, Wang G, Wu Z, Li D. A dense mapping algorithm based on spatiotemporal consistency. Sensors (Basel). 2023;23(4):1876. doi:10.3390/s23041876.
- Sharon Y, Berend D, Liu Y, Shabtai A, Elovici Y. TANTRA: timing-based adversarial network traffic reshaping attack. IEEE Trans Inf Forensics Secur. 2022;17:3225–3237. doi:10.1109/TIFS.2022.3201377.
- Ibrahim Adamu A, Kumar Donta P, Mohd Ali D, Sarang S, Stojanović GM, Seroja Sarnin S. A systematic literature review of advanced machine learning techniques in wireless body area networks: application, challenges, and future directions. IEEE Access. 2025;13:194729–194778. doi:10.1109/ACCESS.2025.3631230.
- Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples [preprint]. 2015. arXiv:1412.6572. doi:10.48550/arXiv.1412.6572.
- Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA. CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors (Basel). 2023;23(13):5941. doi:10.3390/s23135941.
- Cyber Cop. (2023). IoT Intrusion Detection. [online] Kaggle.com. Available from: https://www.kaggle.com/datasets/subhajournal/iotintrusion
- Alotaibi A, Rassam MA. Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense. Future Internet. 2023;15(2):62. doi:10.3390/fi15020062.
- Harbi Y, Medani K, Gherbi C, Aliouat Z, Harous S. Roadmap of adversarial machine learning in Internet of Things-enabled security systems. Sensors. 2024;24(16):5150. doi:10.3390/s24165150.
- Jamiri H, Zyane A. Adversarial attacks in IoT: A performance assessment of ML and DL models. Eng Proc. 2025;112(1):15. doi:10.3390/engproc2025112015.
- Vitorino J, Praça I, Maia E. Towards adversarial realism and robust learning for IoT intrusion detection and classification. Ann Telecommun (Paris). 2023;78:401–412. doi:10.1007/s12243-023-00953-y.
- Almousa O, Hamdallh B, Al-nu’man R. Enhancing IoT security: A comparative analysis of machine learning and deep learning techniques for botnet detection. Eng Technol Appl Sci Res. 2025;15(4):24498–24505. doi:10.48084/etasr.11092.

International Journal of Wireless Security and Networks
| Volume | 04 |
| Issue | 01 |
| Received | 13/01/2026 |
| Accepted | 16/01/2026 |
| Published | 20/01/2026 |
| Publication Time | 7 Days |
Login
PlumX Metrics