{"id":"https://openalex.org/W4404056938","doi":"https://doi.org/10.1109/tnse.2024.3492032","title":"Poisoning the Well: Adversarial Poisoning on ML-Based Software-Defined Network Intrusion Detection Systems","display_name":"Poisoning the Well: Adversarial Poisoning on ML-Based Software-Defined Network Intrusion Detection Systems","publication_year":2024,"publication_date":"2024-11-05","ids":{"openalex":"https://openalex.org/W4404056938","doi":"https://doi.org/10.1109/tnse.2024.3492032"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2024.3492032","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3492032","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008136058","display_name":"Tapadhir Das","orcid":"https://orcid.org/0000-0002-4793-8982"},"institutions":[{"id":"https://openalex.org/I119942576","display_name":"University of the Pacific","ror":"https://ror.org/05ma4gw77","country_code":"US","type":"education","lineage":["https://openalex.org/I119942576"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tapadhir Das","raw_affiliation_strings":["Department of Computer Science, University of the Pacific, Stockton, CA, USA","Department of Computer Science, the University of the Pacific, Stockton, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of the Pacific, Stockton, CA, USA","institution_ids":["https://openalex.org/I119942576"]},{"raw_affiliation_string":"Department of Computer Science, the University of the Pacific, Stockton, USA","institution_ids":["https://openalex.org/I119942576"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039235730","display_name":"Raj Mani Shukla","orcid":"https://orcid.org/0000-0002-8239-7325"},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Raj Mani Shukla","raw_affiliation_strings":["School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K","institution_ids":["https://openalex.org/I51216347"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100748436","display_name":"Shamik Sengupta","orcid":"https://orcid.org/0000-0002-2019-8056"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shamik Sengupta","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA","Department of Computer Science and Engineering, University of Nevada, Reno, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA","institution_ids":["https://openalex.org/I134113660"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nevada, Reno, USA","institution_ids":["https://openalex.org/I134113660"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008136058"],"corresponding_institution_ids":["https://openalex.org/I119942576"],"apc_list":null,"apc_paid":null,"fwci":1.7169,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85984143,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"12","issue":"1","first_page":"252","last_page":"262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.667396068572998},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5962777137756348},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5346478819847107},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.49504509568214417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4002137780189514},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26065918803215027},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08488240838050842}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.667396068572998},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5962777137756348},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5346478819847107},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.49504509568214417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4002137780189514},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26065918803215027},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08488240838050842}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2024.3492032","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3492032","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4818149268","display_name":null,"funder_award_id":"2019164","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1131320503","https://openalex.org/W2002254092","https://openalex.org/W2296509296","https://openalex.org/W2528914598","https://openalex.org/W2560162835","https://openalex.org/W2607219512","https://openalex.org/W2620038827","https://openalex.org/W2789388342","https://openalex.org/W2890165066","https://openalex.org/W2890883923","https://openalex.org/W2942649361","https://openalex.org/W2962835266","https://openalex.org/W2963523189","https://openalex.org/W3006008420","https://openalex.org/W3026161804","https://openalex.org/W3032638893","https://openalex.org/W3046843850","https://openalex.org/W3093253286","https://openalex.org/W3115360974","https://openalex.org/W3158507034","https://openalex.org/W3172444956","https://openalex.org/W3192770481","https://openalex.org/W3217748719","https://openalex.org/W4210544654","https://openalex.org/W4210568036","https://openalex.org/W4213102919","https://openalex.org/W4289538281","https://openalex.org/W4299614280","https://openalex.org/W4306180880","https://openalex.org/W4309082205","https://openalex.org/W4318148078","https://openalex.org/W4327767988","https://openalex.org/W4384937665","https://openalex.org/W6630632610","https://openalex.org/W6755038706","https://openalex.org/W6761100157","https://openalex.org/W6799370634"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"With":[0],"the":[1,38,44,51,84,98,168,177,200],"usage":[2],"of":[3,46,72,104],"Machine":[4],"Learning":[5],"(ML)":[6],"algorithms":[7,27],"in":[8,107,160,191,219],"modern-day":[9],"Network":[10,92],"Intrusion":[11],"Detection":[12],"Systems":[13],"(NIDS),":[14],"contemporary":[15],"network":[16],"communications":[17],"are":[18,28,153],"efficiently":[19],"protected":[20],"from":[21,138],"cyber":[22],"threats.":[23],"However,":[24],"these":[25,158],"ML":[26,39],"starting":[29],"to":[30,157],"be":[31],"compromised":[32],"by":[33],"adversarial":[34,48],"attacks":[35,100,159,184,206],"that":[36,97,112,145],"ambush":[37],"pipeline.":[40],"This":[41],"paper":[42,68],"demonstrates":[43],"feasibility":[45],"an":[47],"attack":[49],"called":[50],"Cosine":[52],"Similarity":[53],"Label":[54],"Manipulation":[55],"(CSLM)":[56],"which":[57,117,131],"is":[58],"geared":[59],"toward":[60],"compromising":[61],"training":[62],"labels":[63],"for":[64],"ML-based":[65],"NIDS.":[66],"The":[67],"develops":[69],"two":[70],"versions":[71],"CSLM":[73,76,80,183,205],"attacks:":[74],"Minimum":[75],"(Min-CSLM)":[77],"and":[78,89,126,148,195,212],"Maximum":[79],"(Max-CSLM).":[81],"We":[82,142],"demonstrate":[83],"attacks'":[85],"efficacy":[86],"towards":[87],"single":[88,108],"multi-controller":[90],"Software-defined":[91],"(SDN)":[93],"setups.":[94],"Results":[95],"indicate":[96],"proposed":[99,182],"provide":[101],"substantial":[102],"deterioration":[103,137,179,202],"classifier":[105],"performance":[106],"SDNs,":[109],"specifically,":[110],"those":[111],"utilize":[113],"Random":[114],"Forests":[115],"(RF),":[116],"deteriorate":[118],"<inline-formula":[119,133,186,208,213],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[120,134,187,209,214],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[121,135,188,210,215],"notation=\"LaTeX\">$\\approx$</tex-math></inline-formula>50%":[122],"under":[123,180,203],"Min-CSLM":[124],"attacks,":[125],"Support":[127],"Vector":[128],"Machines":[129],"(SVM),":[130],"undergo":[132],"notation=\"LaTeX\">$\\approx$</tex-math></inline-formula>60%":[136],"a":[139],"Max-CSLM":[140],"attack.":[141],"also":[143,154],"note":[144],"RF,":[146],"SVM,":[147],"Multi-layer":[149],"Perceptron":[150],"(MLP)":[151],"classifiers":[152],"extensively":[155],"vulnerable":[156],"Multi-controller":[161],"SDN":[162],"setups":[163],"(MSDN)":[164],"as":[165],"they":[166],"incur":[167,176,199],"most":[169,178,201],"observed":[170],"utility":[171],"deterioration.":[172],"MLP-based":[173],"uniform":[174],"MSDNs":[175,198],"both":[181,204],"with":[185,207],"notation=\"LaTeX\">$\\approx$</tex-math></inline-formula>28%":[189],"decrease":[190,218],"performance,":[192,220],"while":[193],"SVM":[194],"RF-based":[196],"variable":[197],"notation=\"LaTeX\">$\\approx$</tex-math></inline-formula>30%":[211],"notation=\"LaTeX\">$\\approx$</tex-math></inline-formula>":[216],"35%":[217],"respectively.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
