{"id":"https://openalex.org/W3106682194","doi":"https://doi.org/10.1145/3400286.3418252","title":"Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations","display_name":"Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations","publication_year":2020,"publication_date":"2020-10-13","ids":{"openalex":"https://openalex.org/W3106682194","doi":"https://doi.org/10.1145/3400286.3418252","mag":"3106682194"},"language":"en","primary_location":{"id":"doi:10.1145/3400286.3418252","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3400286.3418252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058155866","display_name":"Torgeir F\u00f8reid Fladby","orcid":null},"institutions":[{"id":"https://openalex.org/I184531372","display_name":"OsloMet \u2013 Oslo Metropolitan University","ror":"https://ror.org/04q12yn84","country_code":"NO","type":"education","lineage":["https://openalex.org/I184531372"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Torgeir Fladby","raw_affiliation_strings":["Oslo Metropolitan University, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Oslo Metropolitan University, Oslo, Norway","institution_ids":["https://openalex.org/I184531372"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061528903","display_name":"H\u00e5rek Haugerud","orcid":"https://orcid.org/0000-0001-7090-8805"},"institutions":[{"id":"https://openalex.org/I184531372","display_name":"OsloMet \u2013 Oslo Metropolitan University","ror":"https://ror.org/04q12yn84","country_code":"NO","type":"education","lineage":["https://openalex.org/I184531372"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"H\u00e5rek Haugerud","raw_affiliation_strings":["Oslo Metropolitan University, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Oslo Metropolitan University, Oslo, Norway","institution_ids":["https://openalex.org/I184531372"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083527093","display_name":"Stefano Nichele","orcid":"https://orcid.org/0000-0003-4696-9872"},"institutions":[{"id":"https://openalex.org/I184531372","display_name":"OsloMet \u2013 Oslo Metropolitan University","ror":"https://ror.org/04q12yn84","country_code":"NO","type":"education","lineage":["https://openalex.org/I184531372"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Stefano Nichele","raw_affiliation_strings":["Oslo Metropolitan University, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Oslo Metropolitan University, Oslo, Norway","institution_ids":["https://openalex.org/I184531372"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070033925","display_name":"Kyrre Begnum","orcid":null},"institutions":[{"id":"https://openalex.org/I184531372","display_name":"OsloMet \u2013 Oslo Metropolitan University","ror":"https://ror.org/04q12yn84","country_code":"NO","type":"education","lineage":["https://openalex.org/I184531372"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Kyrre Begnum","raw_affiliation_strings":["Oslo Metropolitan University, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Oslo Metropolitan University, Oslo, Norway","institution_ids":["https://openalex.org/I184531372"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032770006","display_name":"Anis Yazidi","orcid":"https://orcid.org/0000-0001-7591-1659"},"institutions":[{"id":"https://openalex.org/I184531372","display_name":"OsloMet \u2013 Oslo Metropolitan University","ror":"https://ror.org/04q12yn84","country_code":"NO","type":"education","lineage":["https://openalex.org/I184531372"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Anis Yazidi","raw_affiliation_strings":["Oslo Metropolitan University, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Oslo Metropolitan University, Oslo, Norway","institution_ids":["https://openalex.org/I184531372"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5058155866"],"corresponding_institution_ids":["https://openalex.org/I184531372"],"apc_list":null,"apc_paid":null,"fwci":0.9251,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.77672967,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"161","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.86011803150177},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8176652193069458},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7809756994247437},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7482540607452393},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.613369345664978},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5972544550895691},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5513668656349182},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.548712432384491},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5098859071731567},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4973662197589874},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4332256615161896}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.86011803150177},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8176652193069458},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7809756994247437},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7482540607452393},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.613369345664978},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5972544550895691},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5513668656349182},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.548712432384491},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5098859071731567},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4973662197589874},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4332256615161896},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3400286.3418252","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3400286.3418252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1581009051","https://openalex.org/W1673923490","https://openalex.org/W1834627138","https://openalex.org/W2024372894","https://openalex.org/W2112796928","https://openalex.org/W2128452997","https://openalex.org/W2162275200","https://openalex.org/W2296452361","https://openalex.org/W2432142698","https://openalex.org/W2513617950","https://openalex.org/W2594481151","https://openalex.org/W2886533716","https://openalex.org/W2945884086","https://openalex.org/W2949502282","https://openalex.org/W2958285686","https://openalex.org/W2981025625"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2899811703"],"abstract_inverted_index":{"Machine-learning":[0],"based":[1],"Intrusion":[2],"Detection":[3],"and":[4],"Prevention":[5],"Systems":[6],"provide":[7],"significant":[8],"value":[9],"to":[10,26,34,45,54,64],"organizations":[11],"because":[12],"they":[13],"can":[14,59],"efficiently":[15],"detect":[16],"previously":[17],"unseen":[18],"variations":[19],"of":[20],"known":[21,27,37],"threats,":[22],"new":[23],"threats":[24],"related":[25],"malware":[28],"or":[29],"even":[30],"zero-day":[31],"malware,":[32],"unrelated":[33],"any":[35],"other":[36],"threats.":[38],"However,":[39],"while":[40],"such":[41],"systems":[42],"prove":[43],"invaluable":[44],"security":[46],"personnel,":[47],"researchers":[48],"have":[49],"observed":[50],"that":[51],"data":[52],"subject":[53],"inspection":[55],"by":[56],"behavioral":[57],"analysis":[58],"be":[60],"perturbed":[61],"in":[62],"order":[63],"evade":[65],"detection.":[66]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
