Affiliation:
1. Department of Information Technology, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia
2. Faculty of Engineering and Information Technology, Taiz University, Taiz 6803, Yemen
Abstract
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks before they enter the system and classifying them as malicious activities. However, the IDS approaches have shortcomings in misclassifying novel attacks or adapting to emerging environments, affecting their accuracy and increasing false alarms. To solve this problem, researchers have recommended using machine learning approaches as engines for IDSs to increase their efficacy. Machine-learning techniques are supposed to automatically detect the main distinctions between normal and malicious data, even novel attacks, with high accuracy. However, carefully designed adversarial input perturbations during the training or testing phases can significantly affect their predictions and classifications. Adversarial machine learning (AML) poses many cybersecurity threats in numerous sectors that use machine-learning-based classification systems, such as deceiving IDS to misclassify network packets. Thus, this paper presents a survey of adversarial machine-learning strategies and defenses. It starts by highlighting various types of adversarial attacks that can affect the IDS and then presents the defense strategies to decrease or eliminate the influence of these attacks. Finally, the gaps in the existing literature and future research directions are presented.
Subject
Computer Networks and Communications
Reference107 articles.
1. Ford, V., and Siraj, A. (2014, January 13–15). Applications of machine learning in cyber security. Proceedings of the 27th International Conference on Computer Applications in Industry and Engineering, New Orleans, LA, USA.
2. An intrusion-detection model;Denning;IEEE Trans. Softw. Eng.,1987
3. Intrusion detection system: A comprehensive review;Liao;J. Netw. Comput. Appl.,2013
4. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues;Aldweesh;Knowledge-Based Syst.,2020
5. Liu, H., and Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Appl. Sci., 9.
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献