{"id":"https://openalex.org/W4385519424","doi":"https://doi.org/10.1186/s42400-023-00171-y","title":"FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems","display_name":"FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems","publication_year":2023,"publication_date":"2023-08-04","ids":{"openalex":"https://openalex.org/W4385519424","doi":"https://doi.org/10.1186/s42400-023-00171-y"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00171-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00171-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00171-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00171-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057115866","display_name":"Kaisheng Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaisheng Fan","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, 150001, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, 150001, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085221201","display_name":"Weizhe Zhang","orcid":"https://orcid.org/0000-0003-4783-876X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weizhe Zhang","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, 518055, Guangdong, China","School of Cyberspace Science, Harbin Institute of Technology, Harbin, 150001, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, 518055, Guangdong, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, 150001, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036068083","display_name":"Guangrui Liu","orcid":"https://orcid.org/0000-0001-6717-8813"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangrui Liu","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, 150001, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, 150001, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048182595","display_name":"Hui He","orcid":"https://orcid.org/0000-0002-6494-775X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui He","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, 150001, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, 150001, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057115866"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.8579,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78608595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8237730264663696},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.710679292678833},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.44479650259017944},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4223475754261017},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4049649238586426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3669700622558594},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3655396103858948}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8237730264663696},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.710679292678833},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.44479650259017944},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4223475754261017},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4049649238586426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3669700622558594},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3655396103858948}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00171-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00171-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00171-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5cd3d59d75ba41969f9f2bcd7b9c4964","is_oa":true,"landing_page_url":"https://doaj.org/article/5cd3d59d75ba41969f9f2bcd7b9c4964","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-12 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00171-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00171-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00171-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1477544716","display_name":null,"funder_award_id":"Guangdong","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1719026620","display_name":null,"funder_award_id":"2020B0101360001","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2376276132","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2645607923","display_name":null,"funder_award_id":"2020YFB1406902","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3575626304","display_name":null,"funder_award_id":"HIT.OCEF.2021007","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3827841025","display_name":null,"funder_award_id":"2021007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G387741228","display_name":null,"funder_award_id":"Grant No. U22A2036","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5414718071","display_name":null,"funder_award_id":"HIT.OCEF","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5517038434","display_name":null,"funder_award_id":"2020YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5785647149","display_name":null,"funder_award_id":"HIT.OCEF.2021007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6680235937","display_name":null,"funder_award_id":"2020YFB1406902","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G675355964","display_name":null,"funder_award_id":"2020B0101360001","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6942397256","display_name":null,"funder_award_id":"HIT.OCEF.2021007","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G695094188","display_name":null,"funder_award_id":"2020B0101360001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G752701465","display_name":null,"funder_award_id":"U22A2036","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7652124268","display_name":null,"funder_award_id":"2020YFB1406902","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8951484681","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385519424.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W2112796928","https://openalex.org/W2603766943","https://openalex.org/W2606697812","https://openalex.org/W2789304371","https://openalex.org/W2934843808","https://openalex.org/W2951944995","https://openalex.org/W2963303354","https://openalex.org/W2963426391","https://openalex.org/W2963465081","https://openalex.org/W2963844355","https://openalex.org/W2963943197","https://openalex.org/W2969695741","https://openalex.org/W3034942609","https://openalex.org/W3039098095","https://openalex.org/W3091123787","https://openalex.org/W3096831136","https://openalex.org/W3111066710","https://openalex.org/W3127561923","https://openalex.org/W3135347465","https://openalex.org/W3138815606","https://openalex.org/W3143373604","https://openalex.org/W3159082513","https://openalex.org/W3174136778","https://openalex.org/W3199625283","https://openalex.org/W3200113267","https://openalex.org/W3213793813","https://openalex.org/W4200633448","https://openalex.org/W4214634256","https://openalex.org/W4214699222","https://openalex.org/W4221034033","https://openalex.org/W4224219490","https://openalex.org/W4312343407","https://openalex.org/W6601719609"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W2364419519","https://openalex.org/W2017948608","https://openalex.org/W2360767377","https://openalex.org/W2360951146"],"abstract_inverted_index":{"Abstract":[0],"Intrusion":[1],"detection":[2,39],"systems":[3],"are":[4,45,109],"increasingly":[5],"using":[6,101],"machine":[7,10],"learning.":[8],"While":[9],"learning":[11],"has":[12],"shown":[13],"excellent":[14],"performance":[15],"in":[16,49,88,103,121,141,231],"identifying":[17],"malicious":[18],"traffic,":[19],"it":[20],"may":[21],"increase":[22],"the":[23,60,67,86,89,98,112,118,126,131,155,159,164,182,187,192,195,199,205,208,216,224,235],"risk":[24],"of":[25,59,91,100,128,158,166,184,194,219,237],"privacy":[26,167],"leakage.":[27],"This":[28],"paper":[29],"focuses":[30],"on":[31,37,171,198,223],"implementing":[32],"a":[33,75,122],"model":[34,42,92,113,120,133,146,161,189,197,210,220],"stealing":[35,43,93,114,221],"attack":[36],"intrusion":[38],"systems.":[40],"Existing":[41],"attacks":[44,222],"hard":[46],"to":[47,66,84,116,130,144,153,176,186,202,211,233],"implement":[48],"practical":[50],"network":[51,104],"environments,":[52],"as":[53,136],"they":[54],"either":[55],"need":[56],"private":[57],"data":[58,156],"victim":[61,68,119],"dataset":[62,201],"or":[63],"frequent":[64],"access":[65],"model.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73],"propose":[74],"novel":[76],"solution":[77],"called":[78],"Fast":[79],"Model":[80],"Stealing":[81],"Attack":[82],"(FMSA)":[83],"address":[85],"problem":[87],"field":[90],"attacks.":[94],"We":[95,213],"also":[96],"highlight":[97],"risks":[99],"ML-NIDS":[102,225],"security.":[105],"First,":[106],"meta-learning":[107],"frameworks":[108],"introduced":[110],"into":[111],"algorithm":[115],"clone":[117,196],"black-box":[123],"state.":[124],"Then,":[125],"number":[127,183,236],"accesses":[129,185],"target":[132,160,188,209],"is":[134,151],"used":[135,152],"an":[137],"optimization":[138],"term,":[139],"resulting":[140],"minimal":[142],"queries":[143],"achieve":[145,163],"stealing.":[147],"Finally,":[148],"adversarial":[149],"training":[150],"simulate":[154],"distribution":[157],"and":[162,190,204],"recovery":[165],"data.":[168],"Through":[169],"experiments":[170],"multiple":[172],"public":[173],"datasets,":[174],"compared":[175],"existing":[177],"state-of-the-art":[178],"algorithms,":[179],"FMSA":[180],"reduces":[181],"improves":[191],"accuracy":[193],"test":[200],"88.9%":[203],"similarity":[206],"with":[207,228],"90.1%.":[212],"can":[214],"demonstrate":[215],"successful":[217],"execution":[218],"system":[226],"even":[227],"protective":[229],"measures":[230],"place":[232],"limit":[234],"anomalous":[238],"queries.":[239]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
