2022
DOI: 10.3390/jcp2010010
|View full text |Cite
|
Sign up to set email alerts
|

Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey

Abstract: Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by their very nature, machine learning systems can introduce vulnerabilities to a security defence whereby a learnt model is unaware of so-called adversarial examples that may intentionally result in mis-classification and therefore bypass a system. Adversarial machine learning has been a research topic for over a decade … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 134 publications
0
11
0
Order By: Relevance
“…The proposed ML‐Entropy, along with the competing solutions, are evaluated using two distinct network traffic datasets: (i$$ i $$) the DARPA2009 dataset, 23 a well‐known dataset that has been used in the context of ML application in cybersecurity and IoT 36,37 ; and (ii$$ ii $$) a dataset from a large corporation, hereafter denoted as RealCorp dataset.…”
Section: Methodsmentioning
confidence: 99%
“…The proposed ML‐Entropy, along with the competing solutions, are evaluated using two distinct network traffic datasets: (i$$ i $$) the DARPA2009 dataset, 23 a well‐known dataset that has been used in the context of ML application in cybersecurity and IoT 36,37 ; and (ii$$ ii $$) a dataset from a large corporation, hereafter denoted as RealCorp dataset.…”
Section: Methodsmentioning
confidence: 99%
“…In addition, the proposed approach performs well on imbalanced data and has a better ability to identify different cyberattacks as it has been mentioned in the previous sub-sections. Therefore, RF-2NIDS can be considered as a robust model against adversarial attacks, whereby the only purpose is to trick the learnt model to make incorrect results (McCarthy et al, 2022;Sauka et al, 2022;Zhao et al, 2022). This will be proven in the next contribution.…”
Section: Comparison With Existing Methodsmentioning
confidence: 99%
“…In this section, we will review existing research that uses GAN to address the issue of unbalanced data in detecting cyberattacks using reinforcement learning (RL) models. The literature in the field of cyberattack detection suggests that recurrent neural network (RNN) and RL approaches are not yet fully explored [12]. Our paper will specifically focus on insider threat detection (ITD) as a type of cyberattack detection.…”
Section: Related Workmentioning
confidence: 99%