{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:55:10Z","timestamp":1778151310477,"version":"3.51.4"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s10922-023-09777-6","type":"journal-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T04:36:02Z","timestamp":1698813362000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices"],"prefix":"10.1007","volume":"32","author":[{"given":"Sankepally Sainath","family":"Reddy","sequence":"first","affiliation":[]},{"given":"Kosaraju","family":"Nishoak","sequence":"additional","affiliation":[]},{"given":"J. L.","family":"Shreya","sequence":"additional","affiliation":[]},{"given":"Yennam Vishwambhar","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"U.","family":"Venkanna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"issue":"9","key":"9777_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3556973","volume":"55","author":"A Liatifis","year":"2023","unstructured":"Liatifis, A., Sarigiannidis, P., Argyriou, V., Lagkas, T.: Advancing SDN from openflow to P4: a survey. ACM Comput. Surv. 55(9), 1\u201337 (2023)","journal-title":"ACM Comput. Surv."},{"key":"9777_CR2","doi-asserted-by":"crossref","unstructured":"Kuranage, M.P.J., Piamrat, K., Hamma, S.: Network traffic classification using machine learning for software defined networks. In: International Conference on Machine Learning for Networking, pp. 28\u201339. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-45778-5_3"},{"key":"9777_CR3","unstructured":"Nougnanke, K.B.: Towards ML-based management of software-defined networks. PhD diss., Universit\u00e9 Paul Sabatier-Toulouse III (2021)"},{"key":"9777_CR4","doi-asserted-by":"publisher","first-page":"87094","DOI":"10.1109\/ACCESS.2021.3086704","volume":"9","author":"Elie F Kfoury","year":"2021","unstructured":"Kfoury, Elie F., Crichigno, Jorge, Bou-Harb, Elias: An exhaustive survey on P4 programmable data plane switches: taxonomy, applications, challenges, and future trends. IEEE Access 9, 87094\u201387155 (2021)","journal-title":"IEEE Access"},{"key":"9777_CR5","volume":"72","author":"MdA Talukder","year":"2023","unstructured":"Talukder, Md.A., Hasan, K.F., Islam, Md.M., Uddin, Md.A., Akhter, A., Yousuf, M.A., Alharbi, F., Moni, M.A.: A dependable hybrid machine learning model for network intrusion detection. J. Inf. Secur. Appl. 72, 103405 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"9777_CR6","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Sinha, A., Wellman, M.P.: Sok: security and privacy in machine learning. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 399\u2013414. IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"9777_CR7","unstructured":"Mohammad J.H., Cusack, G., Keller, E.: Towards evaluation of NIDSs in adversarial setting. In: Proceedings of the ACM CoNEXT Workshop Big Data, Machine Learning and Artificial Intelligence for Data Commununication Networks, pp. 14\u201321 (2019)"},{"issue":"2019","key":"9777_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"Nikolaos Pitropakis","year":"2019","unstructured":"Pitropakis, Nikolaos, Panaousis, Emmanouil, Giannetsos, Thanassis, Anastasiadis, Eleftherios, Loukas, George: A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34(2019), 100199 (2019)","journal-title":"Comput. Sci. Rev."},{"issue":"5","key":"9777_CR9","first-page":"909","volume":"9","author":"Q Shilin","year":"2019","unstructured":"Shilin, Q., Liu, Q., Zhou, S., Wu, C.: Review of artificial intelligence adversarial attack and defense technologies. MDPI Appl. Sci. 9(5), 909 (2019)","journal-title":"MDPI Appl. Sci."},{"key":"9777_CR10","doi-asserted-by":"crossref","unstructured":"Giovanni, A., Colajanni, M., Ferretti, L., Marchetti, M.: Addressing adversarial attacks against security systems based on machine learning. In: Proceedings of the IEEE International Conference on Cyber Conflicts, pp. 1\u201318 (2019)","DOI":"10.23919\/CYCON.2019.8756865"},{"issue":"1","key":"9777_CR11","first-page":"26","volume":"12","author":"MJ De Lucia","year":"2019","unstructured":"De Lucia, M.J., Cotton, C.: Adversarial machine learning for cyber security. J. Inf. Syst. Appl. Res. 12(1), 26 (2019)","journal-title":"J. Inf. Syst. Appl. Res."},{"key":"9777_CR12","unstructured":"Olakunle, I., Abou-Khamis, R., Matrawy, A., Shafiq, M.O.: The threat of adversarial attacks on machine learning in network security\u2014a survey (2019). arXiv:1911.02621"},{"key":"9777_CR13","first-page":"1","volume":"2020","author":"K Sadeghi","year":"2020","unstructured":"Sadeghi, K., Banerjee, A., Gupta, S.K.S.: A system-driven taxonomy of attacks and defenses in adversarial machine learning. IEEE Trans. Emerg. Top. Comput. Intell. 2020, 1\u201318 (2020)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"issue":"2020","key":"9777_CR14","doi-asserted-by":"publisher","first-page":"35403","DOI":"10.1109\/ACCESS.2020.2974752","volume":"8","author":"Nuno Martins","year":"2020","unstructured":"Martins, Nuno, Cruz, Jos\u00e9 Magalh\u00e3es., Cruz, Tiago, Abreu, Pedro Henriques: Adversarial machine learning applied to intrusion and malware scenarios: a systematic review. IEEE Access 8(2020), 35403\u201335419 (2020)","journal-title":"IEEE Access"},{"key":"9777_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, R.S.S., Nystrom, M., Lambert, J., Marshall, A., Goertzel, M., Comissoneru, A., Swann, M., Xia, S.: Adversarial machine learning-industry perspectives. In: IEEE Security and Privacy Workshops (SPW\u201920), pp. 69\u201375. IEEE (2020)","DOI":"10.1109\/SPW50608.2020.00028"},{"key":"9777_CR16","unstructured":"Ibitoye, O., Shehaby, M.E., Matrawy, A., Shafiq, M.O.: The threat of adversarial attacks on machine learning in network security\u2014a survey (2019). arXiv:1911.02621"},{"issue":"5","key":"9777_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453158","volume":"54","author":"I Rosenberg","year":"2021","unstructured":"Rosenberg, I., Shabtai, A., Elovici, Y., Rokach, L.: Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Comput. Surv. 54(5), 1\u201336 (2021)","journal-title":"ACM Comput. Surv."},{"key":"9777_CR18","unstructured":"Zhaoqi, X., Zilberman, N.: Do switches dream of machine learning? Toward in-network classification. In: 18th ACM Workshop on Hot Topics in Networks HotNets \u201919. Association for Computing Machinery (2019)"},{"key":"9777_CR19","doi-asserted-by":"crossref","unstructured":"Bai, J., Zhang, M., Li, G., Liu, C., Xu, M., Hu, H.: FastFE: accelerating ML-based traffic analysis with programmable switches. In: Workshop on secure programmable network infrastructure (SPIN) (2020)","DOI":"10.1145\/3405669.3405818"},{"key":"9777_CR20","unstructured":"Busse-Grawitz, C., Meier, R., Dietm\u00fcller, A., B\u00fchler, T., Vanbever, L.: pforest: in-network inference with random forests (2019). arXiv:1909"},{"key":"9777_CR21","unstructured":"Busse-Grawitz, C., Meier, R., Dietm\u00fcller, A., B\u00fchler, T., Vanbever, L.: pforest: in-network inference with random forests (2022). arXiv:1909.05680v2"},{"key":"9777_CR22","unstructured":"Zheng, C., Xiong, Z., Bui, T.T., Kaupmees, S., Bensoussane, R., Bernabeu, A., Vargaftik, S., Ben-Itzhak, Y., Zilberman, N.: IIsy: practical in-network classification (2022). arXiv:2205.08243"},{"key":"9777_CR23","unstructured":"Zheng, C., Zang, M., Hong, X., Bensoussane, R., Vargaftik, S., Ben-Itzhak, Y., Zilberman, N.: Automating in-network machine learning (2022). arXiv:2205.08824"},{"key":"9777_CR24","doi-asserted-by":"crossref","unstructured":"Guorui, X., Li, Q., Dong, Y., Duan, G., Jiang, Y., Duan, J.: Mousika: enable general in-network intelligence in programmable switches by knowledge distillation. In: IEEE INFOCOM 2022\u2014IEEE Conference on Computer Communications, pp. 1938\u20131947 . IEEE Press (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796936"},{"key":"9777_CR25","unstructured":"Tanyi-Jong, A.A., Gucciardo, M., Fiore, M.: Flowrest: practical flow-level inference in programmable switches with random forests. In: IEEE International Conference on Computer Communications, Zenodo (2023)"},{"key":"9777_CR26","doi-asserted-by":"crossref","unstructured":"Lee, J.-H., Singh, K.: SwitchTree: in-network computing and traffic analyses with Random Forests. Neural Comput. Appl. 1\u201312(2020)","DOI":"10.1007\/s00521-020-05440-2"},{"key":"9777_CR27","unstructured":"Iman, S., Lashkari, A.H., Ghorbani, A.A..: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the Springer International Conference Information Systems Security and Privacy, pp. 108\u2013116 (2018)"},{"key":"9777_CR28","doi-asserted-by":"crossref","unstructured":"Catillo, M., Del Vecchio, A., Ocone, L., Pecchia, A., Villano, U.: USB-IDS-1: a public multilayer dataset of labeled network flows for IDS evaluation. In: 2021 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), pp. 1-6. IEEE (2021)","DOI":"10.1109\/DSN-W52860.2021.00012"},{"key":"9777_CR29","unstructured":"Cramer, J.S.: The origins of logistic regression (December 2002). Tinbergen Institute Working Paper No. 2002-119\/4"},{"key":"9777_CR30","unstructured":"Langley, P., Iba, W., Thomas, K.: An analysis of Bayesian classifiers. In: Proceedings of the Tenth National Conference of Artificial Intelligence, pp. 223\u2013228. AAAI Press (1992)"},{"key":"9777_CR31","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J., Olshen, R., Stone, C.: Classification and Regression Trees. Wadsworth, Belmont, CA (1984)"},{"key":"9777_CR32","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random Forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09777-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-023-09777-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09777-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T05:07:56Z","timestamp":1730437676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-023-09777-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["9777"],"URL":"https:\/\/doi.org\/10.1007\/s10922-023-09777-6","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,1]]},"assertion":[{"value":"20 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"5"}}