4.5 Article

RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems

Islam Debicha et al.

Summary: Intrusion detection systems based on deep learning have achieved state-of-the-art performance, but recent research has shown that adversarial examples can significantly reduce their performance. This paper aims to design an efficient transfer learning-based adversarial detector and evaluate the effectiveness of using multiple strategically placed adversarial detectors compared to a single detector in intrusion detection systems.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Information Systems

Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey

Ke He et al.

Summary: Network-based Intrusion Detection System (NIDS) is vital for defending against network attacks, but it is susceptible to adversarial attacks that manipulate input examples. This article reviews the literature on NIDS, adversarial attacks, and defence mechanisms, highlighting the challenges in launching and detecting adversarial attacks against NIDS.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Review Computer Science, Information Systems

Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense

Afnan Alotaibi et al.

Summary: This article discusses the threats of adversarial machine learning in cybersecurity and presents defense strategies to mitigate these attacks. The paper also identifies gaps in current literature and suggests future research directions.

FUTURE INTERNET (2023)

Article Computer Science, Information Systems

AIDTF: Adversarial training framework for network intrusion detection

Wen Ding Xiong et al.

Summary: This paper proposes an Adversarial Intrusion Detection Training Framework (AIDTF) to improve the accuracy and robustness of IDS. It introduces an adversarial training method to obtain an IDS with high accuracy for both known test sets and unknown disguised attack samples.

COMPUTERS & SECURITY (2023)

Article Computer Science, Theory & Methods

FGMD: A robust detector against adversarial attacks in the IoT network

Hongling Jiang et al.

Summary: Due to the increasing reliance on machine learning models for network intrusion detectors in the Internet of Things (IoT), attacks against these detectors are also on the rise. Existing solutions for adversarial attacks against IoT networks are rare and have limitations. To address this problem, we propose an algorithm to generate adversarial samples and evaluate the performance of the IoT network intrusion detector. We also present a novel framework, FGMD (Feature Grouping and Multi-model fusion Detector), that can defend against adversarial attacks through feature grouping and multi model fusion. Experimental results demonstrate the effectiveness of FGMD against adversarial attacks.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Hardware & Architecture

Adversarial machine learning for network intrusion detection: A comparative study

Houda Jmila et al.

Summary: Intrusion detection is a key topic in cybersecurity, and machine learning is widely used in this field. This paper investigates the robustness of shallow machine learning-based intrusion detection systems against adversarial attacks, and evaluates the performance of different classifiers under different attacks.

COMPUTER NETWORKS (2022)

Article Computer Science, Information Systems

Intrusion detection methods based on integrated deep learning model

Zhendong Wang et al.

Summary: This paper designs integrated deep intrusion detection models for network intrusion and host intrusion detection, which improve detection accuracy; Using a small batch gradient descent method for training and optimization enhances the training efficiency and detection performance of the models.

COMPUTERS & SECURITY (2021)

Article Computer Science, Theory & Methods

SDN-based cyber defense: A survey

Ozgur Yurekten et al.

Summary: This paper discusses the impact of the growth and ubiquity of the Internet on information security and cyber threats, with a focus on how software-defined networking (SDN) can enhance security implementation. Through literature survey and evaluation, the study proposes the role of SDN in addressing common attack types and discusses related research and challenges.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Information Systems

A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM

Jingmei Liu et al.

Summary: The study proposes a network intrusion detection system based on ADASYN oversampling technology and LightGBM, which addresses the issue of imbalanced data by preprocessing and increasing minority samples to enhance detection accuracy.

COMPUTERS & SECURITY (2021)

Article Engineering, Electrical & Electronic

Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors

Dongqi Han et al.

Summary: This study systematically examines the use of ML/DL in NIDS, proposing a method for evaluating NIDS robustness through adversarial attacks in gray/black-box traffic space and offering a defense scheme. Experimental results demonstrate the effectiveness of the proposed attack and the ability of the defense method to mitigate such attacks.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Computer Science, Information Systems

A context-aware robust intrusion detection system: a reinforcement learning-based approach

Kamalakanta Sethi et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Article Computer Science, Theory & Methods

Defending network intrusion detection systems against adversarial evasion attacks

Marek Pawlicki et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Machine Learning Meets Communication Networks: Current Trends and Future Challenges

Ijaz Ahmad et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

InSDN: A Novel SDN Intrusion Dataset

Mahmoud Said Elsayed et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Deep Learning-Based Intrusion Detection with Adversaries

Zheng Wang

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection

Majjed Al-Qatf et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Information Systems

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

Igino Corona et al.

INFORMATION SCIENCES (2013)