{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:30:43Z","timestamp":1756636243097,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212796"},{"type":"electronic","value":"9783031212802"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_21","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"382-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Xuan-Ha","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Xuan-Duong","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Kim-Hung","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Hobbs, A.: The colonial pipeline hack: exposing vulnerabilities in us cybersecurity. In: SAGE Business Cases. SAGE Publications, SAGE Business Cases Originals (2021)","DOI":"10.4135\/9781529789768"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Eskandari, M., Janjua, Z.H., Vecchio, M., Antonelli, F.: Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7(8), 6882\u20136897 (2020)","DOI":"10.1109\/JIOT.2020.2970501"},{"issue":"12","key":"21_CR3","doi-asserted-by":"publisher","first-page":"10859","DOI":"10.1007\/s13369-020-04907-7","volume":"45","author":"R Wazirali","year":"2020","unstructured":"Wazirali, R.: An improved intrusion detection system based on KNN hyperparameter tuning and cross-validation. Arab. J. Sci. Eng. 45(12), 10859\u201310873 (2020)","journal-title":"Arab. J. Sci. Eng."},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Tran, B-S., Ho, T-H., Do, T-X., Le, K-H.: Empirical performance evaluation of machine learning based DDoS attack detections. In: Recent Advances in Internet of Things and Machine Learning, pp. 283\u2013299. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-90119-6_23","DOI":"10.1007\/978-3-030-90119-6_23"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Resende, P.A.A., Drummond, A.C.: A survey of random forest based methods for intrusion detection systems. ACM Comput. Surv. (CSUR) 51(3), 1\u201336 (2018)","DOI":"10.1145\/3178582"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Nguyen, D-T., Ho, X-N., Le, K-H.: MidSiot: a multistage intrusion detection system for internet of things. Wirel. Commun. Mob. Comput. (2022)","DOI":"10.1155\/2022\/9173291"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789\u201333795 (2018)","DOI":"10.1109\/ACCESS.2018.2841987"},{"issue":"2","key":"21_CR8","doi-asserted-by":"publisher","first-page":"432","DOI":"10.3390\/s22020432","volume":"22","author":"X-H Nguyen","year":"2022","unstructured":"Nguyen, X.-H., Nguyen, X.-D., Huynh, H.-H., Le, K.-H.: Realguard: a lightweight network intrusion detection system for IoT gateways. Sensors 22(2), 432 (2022)","journal-title":"Sensors"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Sun, P., et al.: Dl-IDS: extracting features using CNN-LSTM hybrid network for intrusion detection system. Secur. Commun. Netw. (2020)","DOI":"10.1155\/2020\/8890306"},{"issue":"4","key":"21_CR10","doi-asserted-by":"publisher","first-page":"524","DOI":"10.3390\/electronics11040524","volume":"11","author":"K-H Le","year":"2022","unstructured":"Le, K.-H., Nguyen, M.-H., Tran, T.-D., Tran, N.-D.: IMIDS: an intelligent intrusion detection system against cyber threats in IoT. Electronics 11(4), 524 (2022)","journal-title":"Electronics"},{"issue":"3","key":"21_CR11","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","volume":"6","author":"K Ren","year":"2020","unstructured":"Ren, K., Zheng, T., Qin, Z., Liu, X.: Adversarial attacks and defenses in deep learning. Engineering 6(3), 346\u2013360 (2020)","journal-title":"Engineering"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Pacheco, Y., Sun, W.: Adversarial machine learning: a comparative study on contemporary intrusion detection datasets. In: ICISSP, pp. 160\u2013171 (2021)","DOI":"10.5220\/0010253501600171"},{"key":"21_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115782","volume":"186","author":"E Alhajjar","year":"2021","unstructured":"Alhajjar, E., Maxwell, P., Bastian, N.: Adversarial machine learning in network intrusion detection systems. Expert Syst. Appl. 186, 115782 (2021)","journal-title":"Expert Syst. Appl."},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In Proceedings of the 20th International Conference on World Wide Web, pp. 675\u2013684 (2011)","DOI":"10.1145\/1963405.1963500"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Lee, K., Eoff, B., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 5, pp. 185\u2013192 (2011)","DOI":"10.1609\/icwsm.v5i1.14106"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: International Workshop on Recent Advances in Intrusion Detection, pp. 318\u2013337. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_17","DOI":"10.1007\/978-3-642-23644-0_17"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Alfeld, S., Zhu, X., Barford, P.: Explicit defense actions against test-set attacks. In: Thirty-First AAAI Conference on Artificial Intelligence (2017)","DOI":"10.1609\/aaai.v31i1.10767"},{"issue":"1","key":"21_CR18","first-page":"2617","volume":"13","author":"M Br\u00fcckner","year":"2012","unstructured":"Br\u00fcckner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. J. Mach. Learn. Res. 13(1), 2617\u20132654 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Sanghai, S., Verma, D.: Adversarial classification. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 99\u2013108 (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"21_CR20","doi-asserted-by":"publisher","unstructured":"Li, D., Chen, D., Jin, B., Shi, L., Goh, J., Ng, S-K.: MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks. In: International Conference on Artificial Neural Networks, pp. 703\u2013716. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-30490-4_56","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Ghafoorian, M., Nugteren, C., Baka, N., Booij, O., Hofmann, M.: EL-GAN: embedding loss driven generative adversarial networks for lane detection. In: Proceedings of the European Conference on Computer Vision (ECCV) Workshops (2018)","DOI":"10.1007\/978-3-030-11009-3_15"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: Artificial Intelligence Safety and Security, pp. 99\u2013112. Chapman and Hall\/CRC (2018)","DOI":"10.1201\/9781351251389-8"},{"key":"21_CR23","unstructured":"Liu, Y., Chen, X., Liu, C., Song, D.: Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770, 2016"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 582\u2013597. IEEE (2016)","DOI":"10.1109\/SP.2016.41"},{"key":"21_CR25","unstructured":"Li, B., Vorobeychik, Y., Chen, X.: A general retraining framework for scalable adversarial classification. arXiv preprint arXiv:1604.02606 (2016)"},{"key":"21_CR26","unstructured":"Grosse, K., Manoharan, P., Papernot, N., Backes, M., McDaniel, P.: On the (statistical) detection of adversarial examples. arXiv preprint arXiv:1702.06280 (2017)"},{"key":"21_CR27","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"21_CR28","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.future.2020.04.013","volume":"110","author":"M Pawlicki","year":"2020","unstructured":"Pawlicki, M., Chora\u015b, M., Kozik, R.: Defending network intrusion detection systems against adversarial evasion attacks. Future Gener. Comput. Syst. 110, 148\u2013154 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"21_CR29","doi-asserted-by":"publisher","unstructured":"Vu, A-H., Nguyen-Khac, M-Q., Do, X-T., Le, K-H.: A real-time evaluation framework for machine learning-based ids. In: Recent Advances in Internet of Things and Machine Learning, pp. 317\u2013329. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-90119-6_25","DOI":"10.1007\/978-3-030-90119-6_25"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Aiken, J., Scott-Hayward, S.: Investigating adversarial attacks against network intrusion detection systems in SDNs. In: 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 1\u20137. IEEE (2019)","DOI":"10.1109\/NFV-SDN47374.2019.9040101"},{"issue":"13","key":"21_CR31","doi-asserted-by":"publisher","first-page":"10327","DOI":"10.1109\/JIOT.2020.3048038","volume":"8","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Dong, T., Zhang, T., Jialiang, L., Memmi, G., Qiu, M.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327\u201310335 (2020)","journal-title":"IEEE Internet Things J."},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","volume":"187","author":"S Zhao","year":"2021","unstructured":"Zhao, S., Li, J., Wang, J., Zhang, Z., Zhu, L., Zhang, Y.: attackGAN: adversarial attack against black-box ids using generative adversarial networks. Procedia Comput. Sci. 187, 128\u2013133 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 372\u2013387. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S-M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"21_CR36","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"21_CR37","unstructured":"Pelikan, M., Goldberg, D.E., Cant\u00fa-Paz, E., et al.: Boa: the Bayesian optimization algorithm. In: Proceedings of the Genetic and Evolutionary Computation Conference GECCO-99, vol. 1, pp. 525\u2013532. Citeseer (1999)"},{"issue":"1","key":"21_CR38","first-page":"26","volume":"17","author":"W Jia","year":"2019","unstructured":"Jia, W., Chen, X.-Y., Zhang, H., Xiong, L.-D., Lei, H., Deng, S.-H.: Hyperparameter optimization for machine learning models based on Bayesian optimization. J. Electron. Sci. Technol. 17(1), 26\u201340 (2019)","journal-title":"J. Electron. Sci. Technol."},{"key":"21_CR39","doi-asserted-by":"crossref","unstructured":"Lee, S., et al.: Adversarial detection with gaussian process regression-based detector. KSII Trans. Internet Inf. Syst. (TIIS) 13(8), 4285\u20134299 (2019)","DOI":"10.3837\/tiis.2019.08.027"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:35:10Z","timestamp":1668760510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}