Related references
Note: Only part of the references are listed.
Article
Computer Science, Theory & Methods
Islam Debicha et al.
Summary: Intrusion detection systems based on deep learning have achieved state-of-the-art performance, but recent research has shown that adversarial examples can significantly reduce their performance. This paper aims to design an efficient transfer learning-based adversarial detector and evaluate the effectiveness of using multiple strategically placed adversarial detectors compared to a single detector in intrusion detection systems.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Information Systems
Ke He et al.
Summary: Network-based Intrusion Detection System (NIDS) is vital for defending against network attacks, but it is susceptible to adversarial attacks that manipulate input examples. This article reviews the literature on NIDS, adversarial attacks, and defence mechanisms, highlighting the challenges in launching and detecting adversarial attacks against NIDS.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2023)
Review
Computer Science, Information Systems
Afnan Alotaibi et al.
Summary: This article discusses the threats of adversarial machine learning in cybersecurity and presents defense strategies to mitigate these attacks. The paper also identifies gaps in current literature and suggests future research directions.
Article
Computer Science, Information Systems
Wen Ding Xiong et al.
Summary: This paper proposes an Adversarial Intrusion Detection Training Framework (AIDTF) to improve the accuracy and robustness of IDS. It introduces an adversarial training method to obtain an IDS with high accuracy for both known test sets and unknown disguised attack samples.
COMPUTERS & SECURITY
(2023)
Article
Computer Science, Theory & Methods
Hongling Jiang et al.
Summary: Due to the increasing reliance on machine learning models for network intrusion detectors in the Internet of Things (IoT), attacks against these detectors are also on the rise. Existing solutions for adversarial attacks against IoT networks are rare and have limitations. To address this problem, we propose an algorithm to generate adversarial samples and evaluate the performance of the IoT network intrusion detector. We also present a novel framework, FGMD (Feature Grouping and Multi-model fusion Detector), that can defend against adversarial attacks through feature grouping and multi model fusion. Experimental results demonstrate the effectiveness of FGMD against adversarial attacks.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Hardware & Architecture
Houda Jmila et al.
Summary: Intrusion detection is a key topic in cybersecurity, and machine learning is widely used in this field. This paper investigates the robustness of shallow machine learning-based intrusion detection systems against adversarial attacks, and evaluates the performance of different classifiers under different attacks.
Article
Computer Science, Information Systems
Zhendong Wang et al.
Summary: This paper designs integrated deep intrusion detection models for network intrusion and host intrusion detection, which improve detection accuracy; Using a small batch gradient descent method for training and optimization enhances the training efficiency and detection performance of the models.
COMPUTERS & SECURITY
(2021)
Article
Computer Science, Theory & Methods
Ozgur Yurekten et al.
Summary: This paper discusses the impact of the growth and ubiquity of the Internet on information security and cyber threats, with a focus on how software-defined networking (SDN) can enhance security implementation. Through literature survey and evaluation, the study proposes the role of SDN in addressing common attack types and discusses related research and challenges.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Computer Science, Information Systems
Jingmei Liu et al.
Summary: The study proposes a network intrusion detection system based on ADASYN oversampling technology and LightGBM, which addresses the issue of imbalanced data by preprocessing and increasing minority samples to enhance detection accuracy.
COMPUTERS & SECURITY
(2021)
Article
Engineering, Electrical & Electronic
Dongqi Han et al.
Summary: This study systematically examines the use of ML/DL in NIDS, proposing a method for evaluating NIDS robustness through adversarial attacks in gray/black-box traffic space and offering a defense scheme. Experimental results demonstrate the effectiveness of the proposed attack and the ability of the defense method to mitigate such attacks.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Kamalakanta Sethi et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2020)
Article
Computer Science, Theory & Methods
Marek Pawlicki et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2020)
Article
Computer Science, Information Systems
Ijaz Ahmad et al.
Article
Computer Science, Information Systems
Mahmoud Said Elsayed et al.
Article
Computer Science, Information Systems
Zheng Wang
Article
Computer Science, Information Systems
Majjed Al-Qatf et al.
Article
Computer Science, Information Systems
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2016)
Article
Computer Science, Information Systems
Igino Corona et al.
INFORMATION SCIENCES
(2013)