{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:07:45Z","timestamp":1757617665821,"version":"3.44.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031823619"},{"type":"electronic","value":"9783031823626"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82362-6_17","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T10:03:34Z","timestamp":1743501814000},"page":"273-288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Method of\u00a0Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, Through Feature Omission and\u00a0a\u00a0Committee of\u00a0Classifiers"],"prefix":"10.1007","author":[{"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9243-7047","authenticated-orcid":false,"given":"Federica","family":"Uccello","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9327-0138","authenticated-orcid":false,"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"issue":"5","key":"17_CR1","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s00779-021-01568-7","volume":"25","author":"A Pawlicka","year":"2021","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M.: The stray sheep of cyberspace aka the actors who claim they break the law for the greater good. Pers. Ubiquit. Comput. 25(5), 843\u2013852 (2021)","journal-title":"Pers. Ubiquit. Comput."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Pawlicka, A., Chora\u015b, M.,\u00a0Pawlicki, M.: Cyberspace threats: not only hackers and criminals. raising the awareness of selected unusual cyberspace actors-cybersecurity researchers\u2019 perspective. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp.\u00a01\u201311 (2020)","DOI":"10.1145\/3407023.3409181"},{"key":"17_CR3","volume":"103","author":"U Song","year":"2024","unstructured":"Song, U., Hur, G., Lee, S., Park, J.: Unraveling the dynamics of the cyber threat landscape: Major shifts examined through the recent societal events. Sustain. Urban Areas 103, 105265 (2024)","journal-title":"Sustain. Urban Areas"},{"issue":"5","key":"17_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5121\/ijsea.2022.13502","volume":"13","author":"B Dash","year":"2022","unstructured":"Dash, B., Ansari, M.F., Sharma, P., Ali, A.: Threats and opportunities with ai-based cyber security intrusion detection: a review. Int. J. Softw. Eng. Appl. 13(5), 13\u201321 (2022). https:\/\/doi.org\/10.5121\/ijsea.2022.13502","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/978-3-030-50423-6_46","volume-title":"Computational Science \u2013 ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3\u20135, 2020, Proceedings, Part IV","author":"M Chora\u015b","year":"2020","unstructured":"Chora\u015b, M., Pawlicki, M., Puchalski, D., Kozik, R.: Machine learning \u2013 the results are not the only thing that matters! what about security, explainability and fairness? In: Krzhizhanovskaya, V.V., Z\u00e1vodszky, G., Lees, M.H., Dongarra, J.J., Sloot, P.M.A., Brissos, S., Teixeira, J. (eds.) Computational Science \u2013 ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3\u20135, 2020, Proceedings, Part IV, pp. 615\u2013628. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50423-6_46"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","volume":"25","author":"K He","year":"2023","unstructured":"He, K., Kim, D.D., Asghar, M.R.: Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Commun. Surv. Tutorials 25(1), 538\u2013566 (2023)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-030-33617-2_36","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2019","author":"M Chora\u015b","year":"2019","unstructured":"Chora\u015b, M., Pawlicki, M., Kozik, R.: The feasibility of deep learning use for adversarial model extraction in the cybersecurity domain. In: Yin, H., Camacho, D., Tino, P., Tall\u00f3n-Ballesteros, A.J., Menezes, R., Allmendinger, R. (eds.) IDEAL 2019. LNCS, vol. 11872, pp. 353\u2013360. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33617-2_36"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Kozal, J.,\u00a0Zwoli\u0144ska, J.,\u00a0Klonowski, M., Wo\u017aniak, M.: Defending network ids against adversarial examples with continual learning. In: 2023 IEEE International Conference on Data Mining Workshops (ICDMW), pp.\u00a060\u201369, IEEE, (2023)","DOI":"10.1109\/ICDMW60847.2023.00017"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"205766","DOI":"10.1109\/ACCESS.2020.3037329","volume":"8","author":"J Liu","year":"2020","unstructured":"Liu, J., Tian, Y., Zhang, R., Sun, Y., Wang, C.: A two-stage generative adversarial networks with semantic content constraints for adversarial example generation. IEEE Access 8, 205766\u2013205777 (2020)","journal-title":"IEEE Access"},{"issue":"10","key":"17_CR10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0275971","volume":"17","author":"E Alshahrani","year":"2022","unstructured":"Alshahrani, E., Alghazzawi, D., Alotaibi, R., Rabie, O.: Adversarial attacks against supervised machine learning based network intrusion detection systems. PLoS ONE 17(10), e0275971 (2022)","journal-title":"PLoS ONE"},{"issue":"18","key":"17_CR11","doi-asserted-by":"publisher","first-page":"7796","DOI":"10.3390\/s23187796","volume":"23","author":"S Aldhaheri","year":"2023","unstructured":"Aldhaheri, S., Alhuzali, A.: Sgan-ids: Self-attention-based generative adversarial network against intrusion detection systems. Sensors 23(18), 7796 (2023)","journal-title":"Sensors"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Chauhan, R., Heydari, S.S.: Polymorphic adversarial ddos attack on ids using gan. In: 2020 International Symposium on Networks, Computers and Communications (ISNCC), pp.\u00a01\u20136, IEEE (2020)","DOI":"10.1109\/ISNCC49221.2020.9297264"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","volume":"187","author":"S Zhao","year":"2021","unstructured":"Zhao, S., Li, J., Wang, J., Zhang, Z., Zhu, L., Zhang, Y.: attackgan: adversarial attack against black-box ids using generative adversarial networks. Proc. Comput. Sci. 187, 128\u2013133 (2021)","journal-title":"Proc. Comput. Sci."},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"133717","DOI":"10.1109\/ACCESS.2023.3334645","volume":"11","author":"RM Arif","year":"2023","unstructured":"Arif, R.M., et al.: A deep reinforcement learning framework to evade black-box machine learning based iot malware detectors using gan-generated influential features. IEEE Access 11, 133717\u2013133729 (2023)","journal-title":"IEEE Access"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"10989","DOI":"10.1109\/ACCESS.2020.2965184","volume":"8","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Zhou, Y., Pei, S., Zhuge, J., Chen, J.: Adversarial examples detection for xss attacks based on generative adversarial networks. IEEE Access 8, 10989\u201310996 (2020)","journal-title":"IEEE Access"},{"issue":"21","key":"17_CR16","doi-asserted-by":"publisher","first-page":"7585","DOI":"10.3390\/app10217585","volume":"10","author":"S Jang","year":"2020","unstructured":"Jang, S., Li, S., Sung, Y.: Generative adversarial network for global image-based local image to improve malware classification using convolutional neural network. Appl. Sci. 10(21), 7585 (2020)","journal-title":"Appl. Sci."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"27683","DOI":"10.1109\/ACCESS.2024.3358454","volume":"12","author":"FB Khan","year":"2024","unstructured":"Khan, F.B., Durad, M.H., Khan, A., Khan, F.A., Rizwan, M., Ali, A.: Design and performance analysis of an anti-malware system based on generative adversarial network framework. IEEE Access 12, 27683\u201327708 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3358454","journal-title":"IEEE Access"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.future.2020.04.013","volume":"110","author":"M Pawlicki","year":"2020","unstructured":"Pawlicki, M., Chora\u015b, M., Kozik, R.: Defending network intrusion detection systems against adversarial evasion attacks. Futur. Gener. Comput. Syst. 110, 148\u2013154 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Wang, J.,\u00a0Pan, J., AlQerm, I.,\u00a0Liu, Y.: Def-ids: An ensemble defense mechanism against adversarial attacks for deep learning-based network intrusion detection. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp.\u00a01\u20139 (2021)","DOI":"10.1109\/ICCCN52240.2021.9522215"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018)","journal-title":"IEEE Access"},{"key":"17_CR21","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"17_CR22","unstructured":"Madry, A.,\u00a0Makelov, A.,\u00a0Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"issue":"1","key":"17_CR23","first-page":"247","volume":"8","author":"J Raiyn","year":"2014","unstructured":"Raiyn, J., et al.: A survey of cyber attack detection strategies. Int. J. Secur. Appl. 8(1), 247\u2013256 (2014)","journal-title":"Int. J. Secur. Appl."},{"issue":"1","key":"17_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1\u201322 (2019). https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecurity"},{"key":"17_CR25","unstructured":"Abadi, M., et al.: TensorFlow: Large-scale machine learning on heterogeneous systems. Software available from https:\/\/www.tensorflow.org\/. (2015)"},{"key":"17_CR26","unstructured":"Nicolae, M.-I., et\u00a0al.: Adversarial robustness toolbox v1. 0.0, arXiv preprint arXiv:1807.01069 (2018)"},{"key":"17_CR27","doi-asserted-by":"publisher","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: CICIoT2023: a real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13), 5941 (2023). https:\/\/doi.org\/10.3390\/s23135941","DOI":"10.3390\/s23135941"},{"key":"17_CR28","unstructured":"Antonakakis, M., et\u00a0al.: Understanding the mirai botnet. In: 26th USENIX security symposium (USENIX Security 17), pp.\u00a01093\u20131110 (2017)"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82362-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T08:56:32Z","timestamp":1757148992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82362-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823619","9783031823626"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82362-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}