{"id":"https://openalex.org/W4286005659","doi":"https://doi.org/10.3390/computers11070115","title":"Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML","display_name":"Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML","publication_year":2022,"publication_date":"2022-07-20","ids":{"openalex":"https://openalex.org/W4286005659","doi":"https://doi.org/10.3390/computers11070115"},"language":"en","primary_location":{"id":"doi:10.3390/computers11070115","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11070115","pdf_url":"https://www.mdpi.com/2073-431X/11/7/115/pdf?version=1658298939","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/11/7/115/pdf?version=1658298939","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066751175","display_name":"Shahad Alahmed","orcid":null},"institutions":[{"id":"https://openalex.org/I72539421","display_name":"University of Tikrit","ror":"https://ror.org/01zfzax10","country_code":"IQ","type":"education","lineage":["https://openalex.org/I72539421"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Shahad Alahmed","raw_affiliation_strings":["Department of Computer Science, Tikrit University, Al Qadisiyah P.O. Box 42, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tikrit University, Al Qadisiyah P.O. Box 42, Iraq","institution_ids":["https://openalex.org/I72539421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026312219","display_name":"Qutaiba Alasad","orcid":"https://orcid.org/0000-0002-1864-0191"},"institutions":[{"id":"https://openalex.org/I72539421","display_name":"University of Tikrit","ror":"https://ror.org/01zfzax10","country_code":"IQ","type":"education","lineage":["https://openalex.org/I72539421"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Qutaiba Alasad","raw_affiliation_strings":["Department of Petroleum Processing Engineering, Tikrit University, Al Qadisiyah P.O. Box 42, Iraq"],"raw_orcid":"https://orcid.org/0000-0002-1864-0191","affiliations":[{"raw_affiliation_string":"Department of Petroleum Processing Engineering, Tikrit University, Al Qadisiyah P.O. Box 42, Iraq","institution_ids":["https://openalex.org/I72539421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021696550","display_name":"Maytham M. Hammood","orcid":"https://orcid.org/0000-0001-7986-5805"},"institutions":[{"id":"https://openalex.org/I72539421","display_name":"University of Tikrit","ror":"https://ror.org/01zfzax10","country_code":"IQ","type":"education","lineage":["https://openalex.org/I72539421"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Maytham M. Hammood","raw_affiliation_strings":["Department of Computer Science, Tikrit University, Al Qadisiyah P.O. Box 42, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tikrit University, Al Qadisiyah P.O. Box 42, Iraq","institution_ids":["https://openalex.org/I72539421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085073001","display_name":"J.S. Yuan","orcid":"https://orcid.org/0000-0002-2548-8327"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiann-Shiun Yuan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816, USA"],"raw_orcid":"https://orcid.org/0000-0002-2548-8327","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079607802","display_name":"Mohammed Alawad","orcid":"https://orcid.org/0000-0002-7491-0440"},"institutions":[{"id":"https://openalex.org/I185443292","display_name":"Wayne State University","ror":"https://ror.org/01070mq45","country_code":"US","type":"education","lineage":["https://openalex.org/I185443292"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammed Alawad","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Wayne State University, Detroit, MI 48202, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Wayne State University, Detroit, MI 48202, USA","institution_ids":["https://openalex.org/I185443292"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026312219"],"corresponding_institution_ids":["https://openalex.org/I72539421"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":2.8514,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.90885324,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"11","issue":"7","first_page":"115","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864532470703125},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7329666018486023},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5979325771331787},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5740720629692078},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5636742115020752},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5483617186546326},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.5255162715911865},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.4992187023162842},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.4442730247974396},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.44337141513824463},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4385548233985901},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.43187758326530457},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.42524415254592896},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.41155102849006653},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38508400321006775},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3674549162387848}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864532470703125},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7329666018486023},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5979325771331787},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5740720629692078},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5636742115020752},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5483617186546326},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.5255162715911865},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.4992187023162842},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.4442730247974396},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.44337141513824463},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4385548233985901},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.43187758326530457},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.42524415254592896},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.41155102849006653},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38508400321006775},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3674549162387848},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers11070115","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11070115","pdf_url":"https://www.mdpi.com/2073-431X/11/7/115/pdf?version=1658298939","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7cacf8654ab74d65b5f0b55294173e8a","is_oa":true,"landing_page_url":"https://doaj.org/article/7cacf8654ab74d65b5f0b55294173e8a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 11, Iss 7, p 115 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers11070115","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11070115","pdf_url":"https://www.mdpi.com/2073-431X/11/7/115/pdf?version=1658298939","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4286005659.pdf","grobid_xml":"https://content.openalex.org/works/W4286005659.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W433644524","https://openalex.org/W2169623711","https://openalex.org/W2573324059","https://openalex.org/W2728257130","https://openalex.org/W2739748921","https://openalex.org/W2746600820","https://openalex.org/W2789828921","https://openalex.org/W2837167620","https://openalex.org/W2902758299","https://openalex.org/W2908403421","https://openalex.org/W2946127746","https://openalex.org/W2963391384","https://openalex.org/W2967969227","https://openalex.org/W2970405700","https://openalex.org/W2981348233","https://openalex.org/W2983017288","https://openalex.org/W3006165800","https://openalex.org/W3006997833","https://openalex.org/W3015665983","https://openalex.org/W3021340315","https://openalex.org/W3032638893","https://openalex.org/W3035438326","https://openalex.org/W3037857795","https://openalex.org/W3038890324","https://openalex.org/W3045570840","https://openalex.org/W3047589287","https://openalex.org/W3047793363","https://openalex.org/W3080177360","https://openalex.org/W3082458522","https://openalex.org/W3106412272","https://openalex.org/W3109103125","https://openalex.org/W3111413330","https://openalex.org/W3113816305","https://openalex.org/W3115696055","https://openalex.org/W3116191808","https://openalex.org/W3116274835","https://openalex.org/W3118947718","https://openalex.org/W3119693685","https://openalex.org/W3171785101","https://openalex.org/W3177128792","https://openalex.org/W3180153815","https://openalex.org/W3198324776","https://openalex.org/W3198511875","https://openalex.org/W3199209662","https://openalex.org/W3209189985","https://openalex.org/W4200610830","https://openalex.org/W6748503732"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W3009622996","https://openalex.org/W3037859390"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1],"systems":[2],"(IDS)":[3],"are":[4,61],"a":[5,83,97,119,137,163],"very":[6],"vital":[7],"part":[8],"of":[9,144,154,182,190],"network":[10,20,29,76,168],"security,":[11],"as":[12,96,118,136],"they":[13,60],"can":[14],"be":[15,57],"used":[16],"to":[17,56,63,70,81,100,140,150],"protect":[18],"the":[19,43,49,68,72,105,142,145,152,155,180,183,188,191],"from":[21],"illegal":[22],"intrusions":[23],"and":[24,128,147,165,186],"communications.":[25],"To":[26],"detect":[27],"malicious":[28],"traffic,":[30],"several":[31],"IDS":[32,184],"based":[33,90],"on":[34,48,91,162],"machine":[35],"learning":[36,46],"(ML)":[37],"methods":[38],"have":[39,52],"been":[40,54],"developed":[41],"in":[42],"literature.":[44],"Machine":[45],"models,":[47],"other":[50],"hand,":[51],"recently":[53],"proved":[55],"effective,":[58],"since":[59],"vulnerable":[62],"adversarial":[64,88,93,108,177],"perturbations,":[65],"which":[66],"allows":[67],"opponent":[69],"crash":[71],"system":[73,106],"while":[74],"performing":[75],"queries.":[77],"This":[78],"motivated":[79],"us":[80],"present":[82],"defensive":[84],"model":[85,156,185],"that":[86,175],"uses":[87],"training":[89,178],"generative":[92],"networks":[94],"(GANs)":[95],"defense":[98],"strategy":[99],"offer":[101],"better":[102],"protection":[103],"for":[104],"against":[107],"perturbations.":[109],"The":[110,158,171],"experiment":[111],"was":[112,160],"carried":[113],"out":[114],"using":[115],"random":[116],"forest":[117],"classifier.":[120],"In":[121],"addition,":[122],"both":[123],"principal":[124],"component":[125],"analysis":[126],"(PCA)":[127],"recursive":[129],"features":[130],"elimination":[131],"(Rfe)":[132],"techniques":[133],"were":[134],"leveraged":[135],"feature":[138],"selection":[139],"diminish":[141],"dimensionality":[143],"dataset,":[146],"this":[148],"led":[149],"enhancing":[151],"performance":[153],"significantly.":[157],"proposal":[159],"tested":[161],"realistic":[164],"recent":[166],"public":[167],"dataset:":[169],"CSE-CICIDS2018.":[170],"simulation":[172],"results":[173],"showed":[174],"GAN-based":[176],"enhanced":[179],"resilience":[181],"mitigated":[187],"severity":[189],"black-box":[192],"attack.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
