Adversarial machine learning for network intrusion detection systems: A comprehensive survey

K He, DD Kim, MR Asghar - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

R Boutaba, MA Salahuddin, N Limam, S Ayoubi… - Journal of Internet …, 2018 - Springer
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …

Wild patterns: Ten years after the rise of adversarial machine learning

B Biggio, F Roli - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …

Fine-pruning: Defending against backdooring attacks on deep neural networks

K Liu, B Dolan-Gavitt, S Garg - … on research in attacks, intrusions, and …, 2018 - Springer
Deep neural networks (DNNs) provide excellent performance across a wide range of
classification tasks, but their training requires high computational resources and is often …

Evasion attacks against machine learning at test time

B Biggio, I Corona, D Maiorca, B Nelson… - Machine Learning and …, 2013 - Springer
In security-sensitive applications, the success of machine learning depends on a thorough
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …

Insomnia: Towards concept-drift robustness in network intrusion detection

G Andresini, F Pendlebury, F Pierazzi… - Proceedings of the 14th …, 2021 - dl.acm.org
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …

Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

Security evaluation of pattern classifiers under attack

B Biggio, G Fumera, F Roli - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …

Practical evasion of a learning-based classifier: A case study

N Šrndić, P Laskov - 2014 IEEE symposium on security and …, 2014 - ieeexplore.ieee.org
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …

Toward supervised anomaly detection

N Görnitz, M Kloft, K Rieck, U Brefeld - Journal of Artificial Intelligence …, 2013 - jair.org
Anomaly detection is being regarded as an unsupervised learning task as anomalies stem
from adversarial or unlikely events with unknown distributions. However, the predictive …