[HTML][HTML] Comprehensive botnet detection by mitigating adversarial attacks, navigating the subtleties of perturbation distances and fortifying predictions with conformal …

R Yumlembam, B Issac, SM Jacob, L Yang - Information Fusion, 2024 - Elsevier
Botnets are computer networks controlled by malicious actors that present significant
cybersecurity challenges. They autonomously infect, propagate, and coordinate to conduct …

Evaluating model robustness to adversarial samples in network intrusion detection

M Schneider, D Aspinall… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Adversarial machine learning, a technique which seeks to deceive machine learning (ML)
models, threatens the utility and reliability of ML systems. This is particularly relevant in …

Autonomous Threat Response at the Edge Processing Level in the Industrial Internet of Things

G Czeczot, I Rojek, D Mikołajewski - Electronics, 2024 - mdpi.com
Industrial Internet of Things (IIoT) technology, as a subset of the Internet of Things (IoT) in the
concept of Industry 4.0 and, in the future, 5.0, will face the challenge of streamlining the way …

AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks

F Concone, S Gaglio, A Giammanco, GL Re… - ACM Transactions on …, 2024 - dl.acm.org
In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT
systems has driven researchers to investigate the security and reliability of ML techniques. A …

对抗机器学习在网络入侵检测领域的应用

刘奇旭, 王君楠, 尹捷, 陈艳辉, 刘嘉熹 - 通信学报, 2021 - infocomm-journal.com
近年来, 机器学习技术逐渐成为主流网络入侵检测方案. 然而机器学习模型固有的安全脆弱性,
使其难以抵抗对抗攻击, 即通过在输入中施加细微扰动而使模型得出错误结果 …

[PDF][PDF] Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems.

MS Haroon, HM Ali - Computers, Materials & Continua, 2022 - cdn.techscience.cn
Intrusion detection system plays an important role in defending networks from security
breaches. End-to-end machine learning-based intrusion detection systems are being used …

Constraining adversarial attacks on network intrusion detection systems: transferability and defense analysis

N Alhussien, A Aleroud, A Melhem… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Adversarial attacks have been extensively studied in the domain of deep image
classification, but their impacts on other domains such as Machine and Deep Learning …

Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables

JM Adeke, G Liu, J Zhao, N Wu, HM Bashir - Future Internet, 2023 - mdpi.com
Machine learning (ML) models are essential to securing communication networks. However,
these models are vulnerable to adversarial examples (AEs), in which malicious inputs are …

Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network

Z Liu, J Hu, Y Liu, K Roy, X Yuan, J Xu - IEEE Access, 2023 - ieeexplore.ieee.org
Adversarial attacks have threatened the credibility of machine learning models and cast
doubts over the integrity of data. The attacks have created much harm in the fields of …

Black-box adversarial transferability: An empirical study in cybersecurity perspective

K Roshan, A Zafar - Computers & Security, 2024 - Elsevier
The rapid advancement of artificial intelligence within the realm of cybersecurity raises
significant security concerns. The vulnerability of deep learning models in adversarial …