ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2106.09380
  4. Cited By
Modeling Realistic Adversarial Attacks against Network Intrusion
  Detection Systems

Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

17 June 2021
Giovanni Apruzzese
M. Andreolini
Luca Ferretti
Mirco Marchetti
M. Colajanni
    AAML
ArXiv (abs)PDFHTML

Papers citing "Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems"

31 / 31 papers shown
A Review of the Duality of Adversarial Learning in Network Intrusion:
  Attacks and Countermeasures
A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures
Shalini Saini
Anitha Chennamaneni
Babatunde Sawyerr
AAML
278
3
0
18 Dec 2024
Adversarial Challenges in Network Intrusion Detection Systems: Research
  Insights and Future Prospects
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future ProspectsIEEE Access (IEEE Access), 2024
Sabrine Ennaji
Fabio De Gaspari
Dorjan Hitaj
Alicia Kbidi
Luigi V. Mancini
AAML
495
14
0
27 Sep 2024
A Novel Perturb-ability Score to Mitigate Evasion Adversarial Attacks on Flow-Based ML-NIDS
A Novel Perturb-ability Score to Mitigate Evasion Adversarial Attacks on Flow-Based ML-NIDS
Mohamed elShehaby
Ashraf Matrawy
AAML
456
0
0
11 Sep 2024
PASA: Attack Agnostic Unsupervised Adversarial Detection using
  Prediction & Attribution Sensitivity Analysis
PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis
Dipkamal Bhusal
Md Tanvirul Alam
M. K. Veerabhadran
Michael Clifford
Sara Rampazzi
Nidhi Rastogi
AAML
227
5
0
12 Apr 2024
Problem space structural adversarial attacks for Network Intrusion
  Detection Systems based on Graph Neural Networks
Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks
Andrea Venturi
Dario Stabili
Mirco Marchetti
AAML
221
2
0
18 Mar 2024
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive
  Attackers for Security Applications
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Hangsheng Zhang
Jiqiang Liu
Jinsong Dong
AAML
249
1
0
20 Jan 2024
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network
  Intrusion Detection
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion DetectionComputers & security (Comput. Secur.), 2023
João Vitorino
Isabel Praça
Eva Maia
AAML
213
30
0
13 Aug 2023
MLSMM: Machine Learning Security Maturity Model
MLSMM: Machine Learning Security Maturity Model
F. Jedrzejewski
D. Fucci
Oleksandr Adamov
162
1
0
28 Jun 2023
On the Resilience of Machine Learning-Based IDS for Automotive Networks
On the Resilience of Machine Learning-Based IDS for Automotive NetworksIEEE Vehicular Networking Conference (VNC), 2023
Ivo Zenden
Han Wang
Alfonso Iacovazzi
A. Vahidi
R. Blom
S. Raza
AAML
137
8
0
26 Jun 2023
SoK: Adversarial Evasion Attacks Practicality in NIDS Domain and the Impact of Dynamic Learning
SoK: Adversarial Evasion Attacks Practicality in NIDS Domain and the Impact of Dynamic Learning
Mohamed el Shehaby
Ashraf Matrawy
AAML
377
8
0
08 Jun 2023
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion
  Detection
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion DetectionEuropean Symposium on Security and Privacy (Euro S&P), 2023
Giovanni Apruzzese
Pavel Laskov
J. Schneider
252
42
0
30 Apr 2023
Deep transfer learning for intrusion detection in industrial control
  networks: A comprehensive review
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive reviewJournal of Network and Computer Applications (JNCA), 2023
Hamza Kheddar
Yassine Himeur
A. Awad
AI4CE
187
92
0
19 Apr 2023
A Survey on Malware Detection with Graph Representation Learning
A Survey on Malware Detection with Graph Representation LearningACM Computing Surveys (ACM Comput. Surv.), 2023
Tristan Bilot
Nour El Madhoun
Khaldoun Al Agha
Anis Zouaoui
AAML
257
54
0
28 Mar 2023
Review on the Feasibility of Adversarial Evasion Attacks and Defenses
  for Network Intrusion Detection Systems
Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Islam Debicha
Benjamin Cochez
Tayeb Kenaza
Thibault Debatty
Jean-Michel Dricot
Wim Mees
AAML
175
8
0
13 Mar 2023
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion
  Detection Systems
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection SystemsComputers & security (Comput. Secur.), 2023
Islam Debicha
Benjamin Cochez
Tayeb Kenaza
Thibault Debatty
Jean-Michel Dricot
Wim Mees
AAML
163
54
0
12 Mar 2023
Towards Adversarial Realism and Robust Learning for IoT Intrusion
  Detection and Classification
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification
João Vitorino
Isabel Praça
Eva Maia
AAML
324
32
0
30 Jan 2023
Adversarial attacks and defenses on ML- and hardware-based IoT device
  fingerprinting and identification
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identificationFuture generations computer systems (FGCS), 2022
Pedro Miguel Sánchez Sánchez
Alberto Huertas Celdrán
Gérome Bovet
Gregorio Martínez Pérez
AAML
249
31
0
30 Dec 2022
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
296
106
0
29 Dec 2022
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors
Mitigating Adversarial Gray-Box Attacks Against Phishing DetectorsIEEE Transactions on Dependable and Secure Computing (TDSC), 2022
Giovanni Apruzzese
V. S. Subrahmanian
AAML
161
27
0
11 Dec 2022
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion
  Attacks against Network Intrusion Detection Systems
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection SystemsFuture generations computer systems (FGCS), 2022
Islam Debicha
Richard Bauwens
Thibault Debatty
Jean-Michel Dricot
Tayeb Kenaza
Wim Mees
AAML
192
56
0
27 Oct 2022
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks
  against Phishing Website Detectors using Machine Learning
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine LearningAsia-Pacific Computer Systems Architecture Conference (ACSA), 2022
Ying Yuan
Giovanni Apruzzese
Mauro Conti
AAML
335
27
0
24 Oct 2022
Attribute Inference Attacks in Online Multiplayer Video Games: a Case
  Study on Dota2
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2Conference on Data and Application Security and Privacy (CODASPY), 2022
Pier Paolo Tricomi
Lisa Facciolo
Giovanni Apruzzese
Mauro Conti
272
9
0
17 Oct 2022
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial
  Examples
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial ExamplesIEEE Transactions on Network and Service Management (IEEE TNSM), 2022
Giovanni Apruzzese
Rodion Vladimirov
A.T. Tastemirova
Pavel Laskov
AAML
239
18
0
04 Jul 2022
The Role of Machine Learning in Cybersecurity
The Role of Machine Learning in Cybersecurity
Giovanni Apruzzese
Pavel Laskov
Edgardo Montes de Oca
Wissam Mallouli
Luis Brdalo Rapa
A. Grammatopoulos
Fabio Di Franco
232
191
0
20 Jun 2022
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Johannes Schneider
Giovanni Apruzzese
AAML
288
11
0
18 Mar 2022
The Cross-evaluation of Machine Learning-based Network Intrusion
  Detection Systems
The Cross-evaluation of Machine Learning-based Network Intrusion Detection SystemsIEEE Transactions on Network and Service Management (IEEE TNSM), 2022
Giovanni Apruzzese
Luca Pajola
Mauro Conti
227
76
0
09 Mar 2022
Adaptative Perturbation Patterns: Realistic Adversarial Learning for
  Robust Intrusion Detection
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion DetectionFuture Internet (FI), 2022
João Vitorino
Nuno Oliveira
Isabel Praça
AAML
154
41
0
08 Mar 2022
Adversarial Machine Learning In Network Intrusion Detection Domain: A
  Systematic Review
Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review
Huda Ali Alatwi
C. Morisset
AAML
251
27
0
06 Dec 2021
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
  Age of AI-NIDS
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS
Christian Schroeder de Witt
Yongchao Huang
Juil Sock
Martin Strohmeier
AAML
183
3
0
23 Nov 2021
Exploring Robust Architectures for Deep Artificial Neural Networks
Exploring Robust Architectures for Deep Artificial Neural NetworksCommunications Engineer (CE), 2021
Asim Waqas
Ghulam Rasool
Hamza Farooq
N. Bouaynaya
OODAAML
232
17
0
30 Jun 2021
Evaluating Standard Feature Sets Towards Increased Generalisability and
  Explainability of ML-based Network Intrusion Detection
Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion DetectionBig Data Research (BDR), 2021
Mohanad Sarhan
S. Layeghy
Marius Portmann
252
97
0
15 Apr 2021
1