Black-box adversarial attack defense approach: An empirical analysis from cybersecurity perceptive

被引:1
作者
Barik, Kousik [1 ]
Misra, Sanjay [2 ]
Lopez-Baldominos, Ines [1 ]
机构
[1] Univ Alcala, Dept Comp Sci, Madrid, Spain
[2] Inst Energy Technol, Dept Appl Data Sci, Halden, Norway
关键词
Adversarial machine learning; Cybersecurity; Back-box attack; Adversarial defense; Deep learning; SYSTEMS;
D O I
10.1016/j.rineng.2025.105177
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The advancement of deep learning (DL) techniques has transformed various industries, boosting the number of interconnected systems. In Adversarial Machine Learning (AML), adversaries intend to fool Machine Learning (ML) and Deep Learning (DL) models into creating false predictions with intentionally crafted adversarial examples. Due to this, ML and DL-based models are susceptible to adversarial attacks, posing significant challenges for adoption in real-world systems such as IDS. This study proposes a novel hybrid defense model to evaluate the black-box adversarial transferability concept on cybersecurity attack detection. Surrogate and target models are used to validate this concept thoroughly. The proposed model consists of heuristic-based defense methods in the training and testing phases. It incorporates data preprocessing via quantile transformation and feature extraction using kernel principal component analysis (PCA) for nonlinear dimensionality reduction. Two well-known adversarial attack generation methods, i.e., FGSM (Fast Gradient Sign Method) and UAP (Universal Adversarial Perturbation), are employed, and three distinct scenarios are presented for evaluation. The outcome demonstrates an accuracy of 99.29 %, precision of 99.61 %, recall of 99.54 %, ASR of 0.18 %, TPR of 99.32 %, and specificity of 98.65 % using the UAP method. We further evaluated using a balanced dataset and explored latency, model size, and computational cost for real-time applicability. The study's outcome signifies that DL-based models are highly vulnerable to adversarial attacks even though adversaries have no access to the internal details of the target system. The presented study can aid management by creating effective adversarial attack detection strategies to enhance cyberattack detection systems. The study significantly contributes to the IS knowledge base and provides future direction for new researchers to explore, develop, and extend the current studies.
引用
收藏
页数:23
相关论文
共 68 条
[1]   XIDINTFL-VAE: XGBoost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder [J].
Abdulganiyu, Oluwadamilare Harazeem ;
Tchakoucht, Taha Ait ;
Saheed, Yakub Kayode ;
Ahmed, Hilali Alaoui .
JOURNAL OF SUPERCOMPUTING, 2025, 81 (01)
[2]  
Adil M, 2025, Arxiv, DOI [arXiv:2503.00615, 10.48550/ARXIV.2503.00615, DOI 10.48550/ARXIV.2503.00615]
[3]   A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions [J].
Ahmetoglu, Huseyin ;
Das, Resul .
INTERNET OF THINGS, 2022, 20
[4]   Adversarial example detection for DNN models: a review and experimental comparison [J].
Aldahdooh, Ahmed ;
Hamidouche, Wassim ;
Fezza, Sid Ahmed ;
Deforges, Olivier .
ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) :4403-4462
[5]   Adversarial machine learning in Network Intrusion Detection Systems [J].
Alhajjar, Elie ;
Maxwell, Paul ;
Bastian, Nathaniel .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
[6]   Random transformations to improve mitigation of query-based black-box attacks [J].
Ali, Ziad Tariq Muhammad ;
Azad, R. Muhammad Atif ;
Azad, Muhammad Ajmal ;
Holyhead, James ;
Rice, Iain ;
Imran, Ali Shariq .
EXPERT SYSTEMS WITH APPLICATIONS, 2025, 264
[7]  
[Anonymous], 2011, P 4 ACM WORKSH SEC A, DOI DOI 10.1145/2046684.2046692
[8]   Anomaly-based network intrusion detection using denoising autoencoder and Wasserstein GAN synthetic attacks [J].
Arafah, Mohammad ;
Phillips, Iain ;
Adnane, Asma ;
Hadi, Wael ;
Alauthman, Mohammad ;
Al-Banna, Abedal-Kareem .
APPLIED SOFT COMPUTING, 2025, 168
[9]   An integration of meta-heuristic approach utilizing kernel principal component analysis for multimodal medical image registration [J].
Arora, Paluck ;
Mehta, Rajesh ;
Ahuja, Rohit .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05) :6223-6246
[10]  
Milton MAA, 2018, Arxiv, DOI [arXiv:1806.08970, DOI 10.48550/ARXIV.1806.08970]