Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5,762 Hits in 5.1 sec

A Hierarchical Deep Learning Architecture for Robust Intrusion Detection in Time-Evolving Security Landscapes

Shashank R R, Aditya A Navale, Indudhara S
2024 International Journal for Research in Applied Science and Engineering Technology  
Abstract: This paper introduces a novel architecture for Intrusion Detection Systems (IDS), designed to enhance resilience against adversarial attacks by integrating conventional machine learning (ML)  ...  This fusion mechanism effectively combines the strengths of DL and ML models, thereby bolstering the overall robustness of the IDS against sophisticated intrusion attempts.  ...  Adversarial attacks targeting intrusion detection systems continue to evolve, and sophisticated adversaries may exploit vulnerabilities in the model to generate adversarial examples that evade detection  ... 
doi:10.22214/ijraset.2024.58300 fatcat:csc3ff2mobfprhcuxilhxhnf54

Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification [article]

João Vitorino, Isabel Praça, Eva Maia
2023 arXiv   pre-print
approach for a more robust IoT network intrusion detection and cyber-attack classification.  ...  Machine learning models can be used to tackle the growing number of cyber-attack variations targeting IoT systems, but the increasing threat posed by adversarial attacks restates the need for reliable  ...  To determine the most adequate ML models for IoT network intrusion detection, it is important to understand the results and conclusions of previous performance evaluations.  ... 
arXiv:2301.13122v2 fatcat:y75tbjbsznfgldxttahjppntea

An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection [article]

João Vitorino, Miguel Silva, Eva Maia, Isabel Praça
2024 arXiv   pre-print
To reliably compare the robustness of different ML models for cyber-attack detection in enterprise computer networks, they must be evaluated in standardized conditions.  ...  Overall, the robustness of the models to adversarial cyber-attack examples was improved without their generalization to regular traffic being affected, enabling a reliable detection of suspicious activity  ...  In the network intrusion detection domain, ML models based on ensembles of decision trees are very well-established.  ... 
arXiv:2402.16912v1 fatcat:t2autketkreprngqipxmjrrpva

Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning

Kudzai Sauka, Gun-Yoo Shin, Dong-Wook Kim, Myung-Mook Han
2022 Applied Sciences  
This paper developed an adversarial robust and explainable network intrusion detection system based on deep learning by applying adversarial training and implementing explainable AI techniques.  ...  This rise is due to deep neural networks (DNN) complexity and efficiency in making anomaly detection activities more accurate.  ...  Acknowledgments: We would like to appreciate UCI Knowledge Discovery in Databases Archive (https://kdd.ics.uci.edu/) for their effors for providing clear explanation of KDD99 dataset.  ... 
doi:10.3390/app12136451 fatcat:i7psuqjdtnf4higd2uo5r3f2qy

Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks [article]

Olakunle Ibitoye, Omair Shafiq, Ashraf Matrawy
2019 arXiv   pre-print
However, when tested for adversarial robustness, the SNN demonstrates better resilience against the adversarial samples from the IoT dataset, presenting a promising future in the quest for safer and more  ...  Deep learning techniques are being applied to detect and mitigate many of such security threats against IoT networks.  ...  did not evaluate the adversarial robustness of their machine learning models in their study.  ... 
arXiv:1905.05137v1 fatcat:r7x5slaqbnfynajwiix46f4r4y

Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization [article]

Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy
2019 arXiv   pre-print
We apply the min-max (or saddle-point) approach to train intrusion detection systems against adversarial attack samples in NSW-NB 15 dataset.  ...  With the growth of adversarial attacks against machine learning models, several concerns have emerged about potential vulnerabilities in designing deep neural network-based intrusion detection systems  ...  INTRODUCTION The Security applications of deep neural networks (DNNs) like Intrusion Detection System (IDS), malware detection, spam-filtering have become essentials in designing tasks for data protection  ... 
arXiv:1910.14107v1 fatcat:evhwk4ismvazfkj565ocatciuy

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

Yixiang Wang, Shaohua lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang
2020 Cybersecurity  
Also, in order to enhance the model's robustness, we adopt adversarial training to reduce the impact of adversarial examples on the model.  ...  AbstractDeep learning (DL) has exhibited its exceptional performance in fields like intrusion detection.  ...  Adversarial training is a method that combines the original legitimate samples and adversarial samples to retrain the model, which can improve the robustness of the model.  ... 
doi:10.1186/s42400-020-00063-5 fatcat:foakfaojyvfb5ipsg6cuj2hm64

Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense

Afnan Alotaibi, Murad A. Rassam
2023 Future Internet  
Adversarial machine learning (AML) poses many cybersecurity threats in numerous sectors that use machine-learning-based classification systems, such as deceiving IDS to misclassify network packets.  ...  Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks before they enter the system and classifying  ...  to detect suspicious network intrusion.  ... 
doi:10.3390/fi15020062 fatcat:sy3higzxfjatbgrcnpx6kiyg5i

Using EBGAN for Anomaly Intrusion Detection [article]

Yi Cui, Wenfeng Shen, Jian Zhang, Weijia Lu, Chuang Liu, Lin Sun, Si Chen
2022 arXiv   pre-print
This is because we want to use adversarial learning to improve the ability of discriminator to detect malicious traffic. At the same time, the discriminator adopts Autoencoder model.  ...  As an active network security protection scheme, intrusion detection system (IDS) undertakes the important responsibility of detecting network attacks in the form of malicious network traffic.  ...  Adversarial training is a powerful method to enhance the robustness of neural networks. B. Energy-based Generative Adversarial Networks GANs were introduced by Goodfellow et al. in 2014 [8] .  ... 
arXiv:2206.10400v1 fatcat:igli4scnnzfoxbuj4jjfyvto4a

The Threat of Adversarial Attacks on Machine Learning in Network Security – A Survey [article]

Olakunle Ibitoye, Rana Abou-Khamis, Mohamed el Shehaby, Ashraf Matrawy, M. Omair Shafiq
2023 arXiv   pre-print
This is because machine learning applications in network security such as malware detection, intrusion detection, and spam filtering are by themselves adversarial in nature.  ...  We conclude by introducing an adversarial risk grid map and evaluating several existing adversarial attacks against machine learning in network security using the risk grid map.  ...  They also demonstrated that adversarial training was effective in improving the robustness of deep learning based network intrusion detection systems. D.  ... 
arXiv:1911.02621v3 fatcat:vc6g4mckrzcardykunzsxb6kfa

Rallying Adversarial Techniques against Deep Learning for Network Security [article]

Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao
2021 arXiv   pre-print
intrusion detection systems.  ...  Because of this susceptibility, the deep learning models deployed to power a network defense could in fact be the weakest entry point for compromising a network system.  ...  EVALUATED NETWORK In this section, we present a brief overview of the network intrusion detection system and then analyze the Kitsune's deep learning model, KitNET, in more detail. A.  ... 
arXiv:1903.11688v2 fatcat:w4hosk6qh5aexmxducftuhxre4

Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs [article]

Rana Abou Khamis, Ashraf Matrawy
2020 arXiv   pre-print
Network security applications, including intrusion detection systems of deep neural networks, are increasing rapidly to make detection task of anomaly activities more accurate and robust.  ...  We use the min-max approach to formulate the problem of training robust IDS against adversarial examples using two benchmark datasets.  ...  This work was supported in part by the Natural Sciences and Engineering Research Council of Canada (NSERC) through the NSERC Discovery Grant program.  ... 
arXiv:2007.04472v1 fatcat:3qothuaw6fh55idtksh453nd3a

AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs [article]

Helene Orsini, Hongyan Bao, Yujun Zhou, Xiangrui Xu, Yufei Han, Longyang Yi, Wei Wang, Xin Gao, Xiangliang Zhang
2022 arXiv   pre-print
Machine Learning-as-a-Service systems (MLaaS) have been largely developed for cybersecurity-critical applications, such as detecting network intrusions and fake news campaigns.  ...  We are thus motivated to assess the adversarial robustness of the Machine Learning models residing at the core of these security-critical applications with categorical inputs.  ...  ACKNOWLEDGEMENTS The research reported in this paper was partially supported by funding from King Abdullah University of Science and Technology (KAUST).  ... 
arXiv:2212.13989v1 fatcat:qyketwpwoneptng2ndp2ripcvq

An Adversarial Attack Defending System for Securing In-Vehicle Networks [article]

Yi Li, Jing Lin, Kaiqi Xiong
2020 arXiv   pre-print
We first discover and implement two adversarial attack models that are harmful to a Long Short Term Memory (LSTM)-based detection model used in the in-vehicle network.  ...  Our experimental results demonstrate that adversaries can easily attack the LSTM-based detection model with a success rate of over 98%, and the proposed AADS achieves over 99% accuracy for detecting adversarial  ...  In order to build a robust LSTM detection model, we iteratively re-train the LSTM model using both the adversarial examples and the original training samples.  ... 
arXiv:2008.11278v2 fatcat:styzkknekbf6hmlhtbqkvyvwcm

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

Igino Corona, Giorgio Giacinto, Fabio Roli
2013 Information Sciences  
To this end, we leverage on our research experience in the field of intrusion detection, as well as on a thorough investigation of the relevant related works published so far.  ...  Intrusion Detection Systems (IDSs) are one of the key components for securing computing infrastructures. Their objective is to protect against attempts to violate defense mechanisms.  ...  Model of the Adversary: One of the most exciting (and challenging) issues in adversarial pattern classification is to model the profile of attackers, to determine their goals, and better describe intrusive  ... 
doi:10.1016/j.ins.2013.03.022 fatcat:gjmx55wlkbhq5cfmjcx5nh523e
« Previous Showing results 1 — 15 out of 5,762 results