{"id":"https://openalex.org/W4400977145","doi":"https://doi.org/10.1145/3664476.3669974","title":"Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection","display_name":"Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400977145","doi":"https://doi.org/10.1145/3664476.3669974"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3669974","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3669974","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3664476.3669974","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041921145","display_name":"Marta Catillo","orcid":"https://orcid.org/0000-0002-5025-7969"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Marta Catillo","raw_affiliation_strings":["Universit\u00e0 degli Studi del Sannio, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi del Sannio, Italy","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028725987","display_name":"Antonio Pecchia","orcid":"https://orcid.org/0000-0003-2869-8423"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Antonio Pecchia","raw_affiliation_strings":["Universit\u00e0 degli Studi del Sannio, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi del Sannio, Italy","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105094294","display_name":"Antonio Repola","orcid":null},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Antonio Repola","raw_affiliation_strings":["Universit\u00e0 degli Studi del Sannio, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi del Sannio, Italy","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053986858","display_name":"Umberto Villano","orcid":"https://orcid.org/0000-0001-5382-4650"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Umberto Villano","raw_affiliation_strings":["Universit\u00e0 degli Studi del Sannio, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi del Sannio, Italy","institution_ids":["https://openalex.org/I16337185"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041921145"],"corresponding_institution_ids":["https://openalex.org/I16337185"],"apc_list":null,"apc_paid":null,"fwci":1.461,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82840603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8418684005737305},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7521451711654663},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7422119379043579},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5290908813476562},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.5194529891014099},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.48635154962539673},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4730583429336548},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.42845267057418823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40545403957366943},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3588915765285492},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06707456707954407}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8418684005737305},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7521451711654663},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7422119379043579},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5290908813476562},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.5194529891014099},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.48635154962539673},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4730583429336548},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.42845267057418823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40545403957366943},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3588915765285492},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06707456707954407},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3669974","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3669974","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3664476.3669974","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3669974","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2026258420","https://openalex.org/W2132166479","https://openalex.org/W2801080689","https://openalex.org/W2924689635","https://openalex.org/W2948348660","https://openalex.org/W2994725226","https://openalex.org/W3015481738","https://openalex.org/W3111088413","https://openalex.org/W3168146198","https://openalex.org/W3176065393","https://openalex.org/W3205605959","https://openalex.org/W3210361010","https://openalex.org/W4211064163","https://openalex.org/W4220719329","https://openalex.org/W4220846496","https://openalex.org/W4220932048","https://openalex.org/W4221041882","https://openalex.org/W4285110406","https://openalex.org/W4296149706","https://openalex.org/W4313591247","https://openalex.org/W4317214084","https://openalex.org/W4364361361","https://openalex.org/W4385973175"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W2899811703","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Current":[0],"trends":[1],"in":[2,32,54,71,99],"network":[3,15,78],"intrusion":[4],"detection":[5,30],"systems":[6],"(NIDS)":[7],"capitalize":[8],"on":[9,92],"the":[10,18,43,77,106,114,120,123,128,135,142],"extraction":[11],"of":[12,20,45,76,96,108,122],"features":[13],"from":[14,42,58],"traffic":[16,86,98,139],"and":[17,23,94,102,105],"use":[19],"up-to-date":[21],"machine":[22],"deep":[24],"learning":[25],"techniques":[26,111],"to":[27,38,66,112],"infer":[28],"a":[29,63,72,85],"model;":[31],"consequence,":[33],"NIDS":[34,115,143],"can":[35],"be":[36],"vulnerable":[37],"adversarial":[39,67,103,124],"attacks.":[40],"Differently":[41],"plethora":[44],"contributions":[46],"that":[47],"apply":[48],"(and":[49],"misuse)":[50],"feature-level":[51],"attacks":[52],"envisioned":[53],"application":[55,107],"domains":[56],"far":[57],"NIDS,":[59],"this":[60],"paper":[61],"proposes":[62],"novel":[64],"approach":[65],"attacks,":[68],"which":[69],"consists":[70],"realistic":[73],"problem-space":[74,130],"perturbation":[75,81],"traffic.":[79],"The":[80,117],"is":[82],"achieved":[83],"through":[84],"control":[87],"utility.":[88],"Experiments":[89],"are":[90],"based":[91],"normal":[93],"Denial":[95],"Service":[97],"both":[100],"legitimate":[101],"conditions,":[104],"four":[109],"popular":[110],"learn":[113],"models.":[116],"results":[118],"highlight":[119],"transferability":[121],"examples":[125],"generated":[126],"by":[127],"proposed":[129],"attack":[131],"as":[132,134],"well":[133],"effectiveness":[136],"at":[137],"inducing":[138],"misclassifications":[140],"across":[141],"models":[144],"obtained.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
