IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v15y2023i2p62-d1053316.html
   My bibliography  Save this article

Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense

Author

Listed:
  • Afnan Alotaibi

    (Department of Information Technology, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia)

  • Murad A. Rassam

    (Department of Information Technology, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia
    Faculty of Engineering and Information Technology, Taiz University, Taiz 6803, Yemen)

Abstract

Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks before they enter the system and classifying them as malicious activities. However, the IDS approaches have shortcomings in misclassifying novel attacks or adapting to emerging environments, affecting their accuracy and increasing false alarms. To solve this problem, researchers have recommended using machine learning approaches as engines for IDSs to increase their efficacy. Machine-learning techniques are supposed to automatically detect the main distinctions between normal and malicious data, even novel attacks, with high accuracy. However, carefully designed adversarial input perturbations during the training or testing phases can significantly affect their predictions and classifications. Adversarial machine learning (AML) poses many cybersecurity threats in numerous sectors that use machine-learning-based classification systems, such as deceiving IDS to misclassify network packets. Thus, this paper presents a survey of adversarial machine-learning strategies and defenses. It starts by highlighting various types of adversarial attacks that can affect the IDS and then presents the defense strategies to decrease or eliminate the influence of these attacks. Finally, the gaps in the existing literature and future research directions are presented.

Suggested Citation

  • Afnan Alotaibi & Murad A. Rassam, 2023. "Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense," Future Internet, MDPI, vol. 15(2), pages 1-34, January.
  • Handle: RePEc:gam:jftint:v:15:y:2023:i:2:p:62-:d:1053316
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/15/2/62/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/15/2/62/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Hassan Khazane & Mohammed Ridouani & Fatima Salahdine & Naima Kaabouch, 2024. "A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks," Future Internet, MDPI, vol. 16(1), pages 1-42, January.
    2. Muhammad Imran & Annalisa Appice & Donato Malerba, 2024. "Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection," Future Internet, MDPI, vol. 16(5), pages 1-31, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:2:p:62-:d:1053316. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.