2020
DOI: 10.1109/access.2020.3008433
|View full text |Cite
|
Sign up to set email alerts
|

A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity

Abstract: Machine learning algorithms are widely utilized in cybersecurity. However, recent studies show that machine learning algorithms are vulnerable to adversarial examples. This poses new threats to the security-critical applications in cybersecurity. Currently, there is still a short of study on adversarial examples in the domain of cybersecurity. In this paper, we propose a new method known as the brute-force attack method to better evaluate the robustness of the machine learning classifiers in cybersecurity agai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(19 citation statements)
references
References 30 publications
0
13
0
Order By: Relevance
“…The generated bot samples also called GAN_bots along with real_bots are combined into a unified set (Algorithm 3 line 17). This unified set is reshuffled and used to perform 10-fold train-test splitting using the selected classifier (Algorithm 3 lines [18][19][20][21][22][23][24].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The generated bot samples also called GAN_bots along with real_bots are combined into a unified set (Algorithm 3 line 17). This unified set is reshuffled and used to perform 10-fold train-test splitting using the selected classifier (Algorithm 3 lines [18][19][20][21][22][23][24].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…However, a single machine learning algorithm is no longer sufficient to meet the modern IDS's extensive requirements [7,4,8,9]. Besides the high traffic volume, IDS attacks have diversified and are way more sophisticated [6]. Each machine learning algorithm has its pros and cons.…”
Section: Table I Commonly Used Datasets For Network Intrusion Detectionmentioning
confidence: 99%
“…The problem of overfitting can be addressed using pruning. Entropy and information gain used in building a decision tree is calculated using the equations ( 5) and (6).…”
Section: Decision Treementioning
confidence: 99%
“…However, since the inception of the smart healthcare concept, securing smart devices and confidential hospital/patient data has been one of the major challenges facing the industry. On the other hand, Machine Learning (ML), which is closely associated with computational statistics and one major aspect of the Security of Things (SoTs), has been presented to several applications to cybersecurity for the analysis of hybrid networks, comprised of both anomaly detection and the detection of data mismanagement [1]. The ML technique is apparently becoming the most promising approach to deal with security glitches and several hidden (otherwise known as zero-day) attacks in healthcare systems [2].…”
Section: Introductionmentioning
confidence: 99%