2018 Innovations in Intelligent Systems and Applications (INISTA) 2018
DOI: 10.1109/inista.2018.8466271
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection systems vulnerability on adversarial examples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(30 citation statements)
references
References 4 publications
0
30
0
Order By: Relevance
“…Network Intrusion Detection Systems, NIDS, are used to detect malicious traffic in a computer network. The subject can be divided into two types, signature based detection and anomaly based detection [10], [11]. Signature based NIDS follow a static set of signatures and patterns to detect already known attacks.…”
Section: Network Intrusion Detection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Network Intrusion Detection Systems, NIDS, are used to detect malicious traffic in a computer network. The subject can be divided into two types, signature based detection and anomaly based detection [10], [11]. Signature based NIDS follow a static set of signatures and patterns to detect already known attacks.…”
Section: Network Intrusion Detection Systemmentioning
confidence: 99%
“…A dynamic piece of computer security is knowing whether a system has been or is being altered. These systems are called intrusion detection systems and are made to alleviate the dangers of system failure and misuse [1]. Network intrusion detection systems can be isolated into anomaly-based systems and signature-based systems.…”
Section: Introductionmentioning
confidence: 99%
“…However, the NSL-KDD dataset that was used was generated over a decade ago and may not represent the type of network attack traffic that would be expected in today's IoT networks. Warzynski et al [10] also evaluated the NSL-KDD dataset by training a FNN to classify the network packets, and then tested the resilience of their model to adversarial examples. The dataset used in their experiment may not represent a typical IoT network traffic.…”
Section: Related Workmentioning
confidence: 99%
“…To resolve this issue, several approaches [7]- [11] have been proposed for the intrusion detection methods used by IDS, based on traffic analysis and anomalies. Anomalous traffic is identified based on recognition patterns [12]. These patterns can be set manually or automatically by a Honeypot type system [13], [14] or by machine learning algorithms [15], [16].…”
Section: Introductionmentioning
confidence: 99%