2021
DOI: 10.1109/jiot.2020.3048038
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Attacks Against Network Intrusion Detection in IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 209 publications
(52 citation statements)
references
References 22 publications
0
52
0
Order By: Relevance
“…In the year 2019 Qiu et al [26] have proposed a novel adversarial network attack to see if the deep learning-based IDS are equally prone to adversarial attacks. They have reported that with this adversarial attack, the accuracy of Kitsune is compromised.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In the year 2019 Qiu et al [26] have proposed a novel adversarial network attack to see if the deep learning-based IDS are equally prone to adversarial attacks. They have reported that with this adversarial attack, the accuracy of Kitsune is compromised.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The scope of this research can further be extended if the investigation on another dataset would also be explored. Moreover, the proposed adversarial attack can be validated to other well-known variants of deep learning models [26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Data poisoning is performed by changing the training data in the damaged edge devices, while model poisoning uses some predefined rules to generates updates to the poisoned model. Zhao Hitaj et al [118] 2017 Differential privacy at different granularity Ibitoye et al [119] 2019 The study uses two deep learning approaches, including, a typical Feedforward Neural Network (FNN) and a Self-normalizing Neural Network (SNN) Hassan et al [120] 2020 A robust decision boundary optimization approach Song et al [121] 2020 The use of deep neural networks Qiu et al [122] 2021 The use of saliency maps to identify the critical features…”
Section: B Poisoning Attackmentioning
confidence: 99%
“…Song et al [121] proposed federated defense against adversarial attacks using deep neural networks. Qiu et al [122] proposed an adversarial attack against deep learning-based network intrusion detection systems to attack one state-of-the-art Kitsune [59]. The proposed attack uses saliency maps to identify the critical features.…”
Section: E Adversarial Attackmentioning
confidence: 99%
“…Machine learning-based solutions of IDS systems for IoT environment have been introduced [30], [38]. Qiu et al [30] have proposed network intrusion detection system (NIDS) for IoT environment using deep learning AutoEncoder technique. The proposed NIDS was able to achieve 94% accuracy in detecting DoS/DDoS attacks.…”
Section: Dos/ddos Attack and Its Counter Measures In Iot Networkmentioning
confidence: 99%