2022
DOI: 10.3390/computers11070115
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML

Abstract: Intrusion detection systems (IDS) are a very vital part of network security, as they can be used to protect the network from illegal intrusions and communications. To detect malicious network traffic, several IDS based on machine learning (ML) methods have been developed in the literature. Machine learning models, on the other hand, have recently been proved to be effective, since they are vulnerable to adversarial perturbations, which allows the opponent to crash the system while performing network queries. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 47 publications
(67 reference statements)
0
5
0
Order By: Relevance
“…In Table 1, the attacks are listed. To more accurately represent the attacks, a network infrastructure with machine diversity similar to real-world networks was developed (five departments making up the victim organisation, with fifty attacker machines, four hundred victim machines, and thirty servers) [3,2]. The dataset includes 80 features that CICFlowMeter-V3 retrieved from the traffic, together with forward and backward collected system logs and network traffic for each machine [33].…”
Section: Experiments and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In Table 1, the attacks are listed. To more accurately represent the attacks, a network infrastructure with machine diversity similar to real-world networks was developed (five departments making up the victim organisation, with fifty attacker machines, four hundred victim machines, and thirty servers) [3,2]. The dataset includes 80 features that CICFlowMeter-V3 retrieved from the traffic, together with forward and backward collected system logs and network traffic for each machine [33].…”
Section: Experiments and Discussionmentioning
confidence: 99%
“…The output gate manages the distribution of the most recent data to other networks. It is denoted by the symbol OG and the output gate's value at time instance t is expressed in Equation (3).…”
Section: Long Short-term Memory (Lstm)mentioning
confidence: 99%
See 1 more Smart Citation
“…The CSE-CIC-IDS2018 intrusion detection dataset was created in 2018 by the Communications Security Establishment and the Canadian Institute for Cybersecurity, both of which have their headquarters in Fredericton, Canada ( [52]; [53]). It is the most recent intrusion dataset, acquired to conduct real attacks [54]. It is available to the public.…”
Section: B Cse-cic-ids2018 Datasetmentioning
confidence: 99%
“…Common attacks are listed in Table 5. To more accurately represent the attacks, a network infrastruc- ture with machine diversity similar to real-world networks was developed (five departments making up the victim organization, with fifty attacker machines, four hundred victim machines, and thirty servers) ( [54]; [3]).…”
Section: B Cse-cic-ids2018 Datasetmentioning
confidence: 99%