Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023‏ - Elsevier
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …

[HTML][HTML] SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection

J Vitorino, I Praça, E Maia - Computers & Security, 2023‏ - Elsevier
Abstract Machine Learning (ML) can be incredibly valuable to automate anomaly detection
and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023‏ - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

[HTML][HTML] A machine learning and blockchain based efficient fraud detection mechanism

T Ashfaq, R Khalid, AS Yahaya, S Aslam, AT Azar… - Sensors, 2022‏ - mdpi.com
In this paper, we address the problems of fraud and anomalies in the Bitcoin network. These
are common problems in e-banking and online transactions. However, as the financial …

Modeling realistic adversarial attacks against network intrusion detection systems

G Apruzzese, M Andreolini, L Ferretti… - … Threats: Research and …, 2022‏ - dl.acm.org
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …

TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems

I Debicha, R Bauwens, T Debatty, JM Dricot… - Future Generation …, 2023‏ - Elsevier
Nowadays, intrusion detection systems based on deep learning deliver state-of-the-art
performance. However, recent research has shown that specially crafted perturbations …

Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems

I Debicha, B Cochez, T Kenaza, T Debatty, JM Dricot… - Computers & …, 2023‏ - Elsevier
Due to the numerous advantages of machine learning (ML) algorithms, many applications
now incorporate them. However, many studies in the field of image classification have …

[HTML][HTML] Spear siem: A security information and event management system for the smart grid

P Radoglou-Grammatikis, P Sarigiannidis, E Iturbe… - Computer Networks, 2021‏ - Elsevier
The technological leap of smart technologies has brought the conventional electrical grid in
a new digital era called Smart Grid (SG), providing multiple benefits, such as two-way …

Enhanced intrusion detection systems performance with UNSW-NB15 data analysis

S More, M Idrissi, H Mahmoud, AT Asyhari - Algorithms, 2024‏ - mdpi.com
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud
computing, virtualization, and smart devices has led to a massive annual production of over …

FGMD: A robust detector against adversarial attacks in the IoT network

H Jiang, J Lin, H Kang - Future Generation Computer Systems, 2022‏ - Elsevier
Since network intrusion detectors for the Internet of Things (IoT) increasingly rely on
machine learning models, attacks against these detectors are also escalating. Machine …