2020
DOI: 10.48550/arxiv.2004.11898
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Adversarial Machine Learning in Network Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…Alhajjar et al [2] explore the use of evolutionary computations and generative adversarial networks as a tool for crafting adversarial examples that aim to evade machine learning models used for network traic classiication. These strategies were applied to the NSL-KDD and UNSW-NB15 datasets.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Alhajjar et al [2] explore the use of evolutionary computations and generative adversarial networks as a tool for crafting adversarial examples that aim to evade machine learning models used for network traic classiication. These strategies were applied to the NSL-KDD and UNSW-NB15 datasets.…”
Section: Related Workmentioning
confidence: 99%
“…None of these previous works can handle the same amount of domain and mathematical dependencies supported by our FENCE framework. In Table 18 [2] Network Traic GAN/PSO OHE Linear Granados et al [28] Network Traic Iterative Range Stat optimization Sadeghzadeh et al [59] Packets UAP Range -Network Flows Network Bursts Han et al [31] Botnet GAN/PSO Range -Abusnaina et al [1] DDoS Detection Sample Range injection Ratio -Chen et al [13] Network Traic Iterative Range optimization -GAN Table 18. Comparison to existing work on evasion atacks in cybersecurity domains.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Alhajjar et al [29] explored utilizing particle swarm optimization (PSO), genetic algorithm (GA), and GANs to generate AEs for network traffic. The performance of these generation techniques was assessed over SVM, DT, NB, KNN, RF, MLP, Gradient Boosting (GB), LR, Linear Discriminant Analysis (LDA), Quadratic Discriminant Analysis (QDA), and Bagging (BAG) using the NSL-KDD and UNSW-NB15 datasets.…”
Section: A Generation Of Aes To Attack Ml-based Nids Modelsmentioning
confidence: 99%