2020
DOI: 10.3390/computers9030058
|View full text |Cite
|
Sign up to set email alerts
|

An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm

Abstract: In today’s digital world, the information systems are revolutionizing the way we connect. As the people are trying to adopt and integrate intelligent systems into daily lives, the risks around cyberattacks on user-specific information have significantly grown. To ensure safe communication, the Intrusion Detection Systems (IDS) were developed often by using machine learning (ML) algorithms that have the unique ability to detect malware against network security violations. Recently, it was reported that the IDS … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…In Random Neural Network-ADV [52] method the authors have used adversarial retraining approach to improve the robustness of random neural network. NSL KDD dataset is used for the experiments.…”
Section: A Proactivementioning
confidence: 99%
“…In Random Neural Network-ADV [52] method the authors have used adversarial retraining approach to improve the robustness of random neural network. NSL KDD dataset is used for the experiments.…”
Section: A Proactivementioning
confidence: 99%
“…Qureshi et al proposed a novel adversarial intrusion detection system based on random neural networks (RNN-ADV). However, the perturbation environment significantly affects the performance of this model, which performs better in terms of accuracy and F1-score compared to deep neural networks when using the JSMA algorithm 30 . In the literature 31 , Safa et al proposed a joint reinforcement learning-based intrusion detection system (FRL-IDS) for Internet of Things (IoT) networks in healthcare infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…In whitebox attacks, the attacker has knowledge of the attacked model's internal structure and parameters, and exploits that knowledge. It is commonly performed by using the model's gradients [5,7,12].…”
Section: Related Workmentioning
confidence: 99%