2023
DOI: 10.3390/fi15020062
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense

Abstract: Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks before they enter the system and classifying them as malicious activities. However, the IDS approaches have shortcomings in misclassifying novel attacks or adapting to emerging environments, affecting their accuracy and increasing false alarms. To solve this proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(19 citation statements)
references
References 75 publications
0
7
0
Order By: Relevance
“…The objective is to overwhelm the resources of the target, causing disruption and making services inaccessible to authorized users. DDoS attacks are challenging to mitigate because they exploit the distributed nature of the assault, making it difficult to trace and block the multitude of sources simultaneously [22]. Attackers leverage diverse techniques, including amplification, reflection, and application-layer exploits, to maximize the impact.…”
Section: Ddosmentioning
confidence: 99%
“…The objective is to overwhelm the resources of the target, causing disruption and making services inaccessible to authorized users. DDoS attacks are challenging to mitigate because they exploit the distributed nature of the assault, making it difficult to trace and block the multitude of sources simultaneously [22]. Attackers leverage diverse techniques, including amplification, reflection, and application-layer exploits, to maximize the impact.…”
Section: Ddosmentioning
confidence: 99%
“…Based on recognized attack patterns, WAFs examine incoming tra c and apply predetermined rules to deny or permit requests. [22] • Attackers can use zeroday assaults or evasion strategies to get around WAFs.…”
Section: Web Application Firewallsmentioning
confidence: 99%
“…Attack Severity Classification is a critical concept in cybersecurity that refers to the process of categorizing attacks based on their severity. This concept is essential for organizations to develop appropriate responses and strategies to prevent or mitigate attacks [6]. Attack severity classification helps organizations to understand the potential impact of an attack, including its scope, duration, and level of damage.…”
Section: Attack Severity Classificationmentioning
confidence: 99%
“…1, April 2023, pp. 01-10 ISSN 2776-8007 2 risks and vulnerabilities present in a network, enabling organizations to take a more targeted and effective approach to cybersecurity [6].…”
Section: Introductionmentioning
confidence: 99%