Adversarial attack defense analysis: An empirical approach in cybersecurity perspective

被引:4
作者
Barik, Kousik [1 ]
Misra, Sanjay [2 ,3 ]
机构
[1] Univ Alcala, Dept Comp Sci, Madrid, Spain
[2] Ostfold Univ Coll, Dept Comp Sci & Commun, Halden, Norway
[3] Inst Energy Technol, Dept Appl Data Sci, Halden, Norway
关键词
Adversarial attack; Cybersecurity; Adversarial machine learning; Adversarial defense; Deep learning;
D O I
10.1016/j.simpa.2024.100681
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Advancements in artificial intelligence in the cybersecurity domain introduce significant security challenges. A critical concern is the exposure of deep learning techniques to adversarial attacks. Adversary users intentionally attempt to mislead the techniques by infiltrating adversarial samples to mislead the prediction of security devices. The study presents extensive experimentation of defense methods using Python-based opensource code with two benchmark datasets, and the outcomes are demonstrated using evaluation metrics. This code library can be easily utilized and reproduced for cybersecurity research on countering adversarial attacks. Exploring strategies for protecting against adversarial attacks is significant in enhancing the resilience of deep learning techniques.
引用
收藏
页数:5
相关论文
共 27 条
[1]   A systematic literature review for network intrusion detection system (IDS) [J].
Abdulganiyu, Oluwadamilare Harazeem ;
Tchakoucht, Taha Ait ;
Saheed, Yakub Kayode .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) :1125-1162
[2]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[3]   Enhancing cybersecurity in smart grids: Deep black box adversarial attacks and quantum voting ensemble models for blockchain privacy-preserving storage [J].
Aurangzeb, Muhammad ;
Wang, Yifei ;
Iqbal, Sheeraz ;
Naveed, Ausnain ;
Ahmed, Zeeshan ;
Alenezi, Mohammed ;
Shouran, Mokhtar .
ENERGY REPORTS, 2024, 11 :2493-2515
[4]  
Barik Kousik, 2022, Illumination of Artificial Intelligence in Cybersecurity and Forensics. Lecture Notes on Data Engineering and Communications Technologies (109), P71, DOI 10.1007/978-3-030-93453-8_4
[5]  
Barik K., 2023, INT WORKSH SEC RES D, P71, DOI [10.1007/978-3-031-55829-0-5, DOI 10.1007/978-3-031-55829-0-5]
[6]  
Barik K., 2021, Glob. Transitions Proc., V2, P350, DOI [10.1016/j.gltp.2021.08.043, DOI 10.1016/J.GLTP.2021.08.043]
[7]   IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system [J].
Barik, Kousik ;
Misra, Sanjay .
SOFTWARE IMPACTS, 2024, 21
[8]   Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network [J].
Barik, Kousik ;
Misra, Sanjay ;
Fernandez-Sanz, Luis .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) :2353-2376
[9]   Analysis of customer reviews with an improved VADER lexicon classifier [J].
Barik, Kousik ;
Misra, Sanjay .
JOURNAL OF BIG DATA, 2024, 11 (01)
[10]  
Barik Kousik, 2023, Comput Intell Neurosci, V2023, P6348831, DOI 10.1155/2023/6348831