{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T04:28:32Z","timestamp":1774672112873,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11432-021-3455-1","type":"journal-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T07:03:04Z","timestamp":1656658984000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems"],"prefix":"10.1007","volume":"65","author":[{"given":"Guangrui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Weizhe","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xinjie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kaisheng","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,23]]},"reference":[{"key":"3455_CR1","doi-asserted-by":"publisher","first-page":"220301","DOI":"10.1007\/s11432-019-2907-4","volume":"63","author":"J Yang","year":"2020","unstructured":"Yang J, Johansson T. An overview of cryptographic primitives for possible use in 5G and beyond. Sci China Inf Sci, 2020, 63: 220301","journal-title":"Sci China Inf Sci"},{"key":"3455_CR2","doi-asserted-by":"publisher","first-page":"032114","DOI":"10.1007\/s11432-017-9288-4","volume":"61","author":"Y Dong","year":"2018","unstructured":"Dong Y, Zhang Y Q, Ma H, et al. An adaptive system for detecting malicious queries in web attacks. Sci China Inf Sci, 2018, 61: 032114","journal-title":"Sci China Inf Sci"},{"key":"3455_CR3","unstructured":"Zhang X Z, Zhu X J, Lessard L. Online data poisoning attacks. In: Proceedings of Learning for Dynamics and Control (PMLR), 2020. 201\u2013210"},{"key":"3455_CR4","doi-asserted-by":"publisher","first-page":"110767","DOI":"10.1016\/j.jss.2020.110767","volume":"170","author":"J Y Lin","year":"2020","unstructured":"Lin J Y, Xu L, Liu Y Q, et al. Black-box adversarial sample generation based on differential evolution. J Syst Softw, 2020, 170: 110767","journal-title":"J Syst Softw"},{"key":"3455_CR5","first-page":"2","volume":"5","author":"Y Mirsky","year":"2018","unstructured":"Mirsky Y, Doitshman T, Elovici Y, et al. Kitsune: an ensemble of autoencoders for online network intrusion detection. Mach Learn, 2018, 5: 2","journal-title":"Mach Learn"},{"key":"3455_CR6","doi-asserted-by":"publisher","first-page":"107042","DOI":"10.1016\/j.comnet.2019.107042","volume":"168","author":"W Elmasry","year":"2020","unstructured":"Elmasry W, Akbulut A, Zaim A H. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput Netw, 2020, 168: 107042","journal-title":"Comput Netw"},{"key":"3455_CR7","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring M, Wunderlich S, Scheuring D, et al. A survey of network-based intrusion detection data sets. Comput Secur, 2019, 86: 147\u2013167","journal-title":"Comput Secur"},{"key":"3455_CR8","unstructured":"Nasr M, Bahramali A, Houmansadr A. Defeating DNN-based traffic analysis systems in real-time with blind adversarial perturbations. In: Proceedings of the 30th USENIX Security Symposium, 2021. 2705\u20132722"},{"key":"3455_CR9","unstructured":"Stinson E, Mitchell J C. Towards systematic evaluation of the evadability of bot\/botnet detection methods. In: Proceedings of the 2nd Conference on USENIX Workshop on Offensive Technologies (WOOT\u201908), San Jose, 2008. 1\u20139"},{"key":"3455_CR10","unstructured":"Homoliak I, Teknos M, Ochoa M, et al. Improving network intrusion detection classifiers by non-payload-based exploit-independent obfuscations: an adversarial approach. 2018. ArXiv:1805.02684"},{"key":"3455_CR11","doi-asserted-by":"crossref","unstructured":"Hashemi M J, Cusack G, Keller E. Towards evaluation of nidss in adversarial setting. In: Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks, Orlando, 2019. 14\u201321","DOI":"10.1145\/3359992.3366642"},{"key":"3455_CR12","doi-asserted-by":"crossref","unstructured":"Aiken J, Scott-Hayward S. Investigating adversarial attacks against network intrusion detection systems in sdns. In: Proceedings of IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dallas, 2019. 1\u20137","DOI":"10.1109\/NFV-SDN47374.2019.9040101"},{"key":"3455_CR13","doi-asserted-by":"crossref","unstructured":"Usama M, Asim M, Latif S, et al. Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: Proceedigns of the 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, 2019. 78\u201383","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"3455_CR14","unstructured":"Han D Q, Wang Z L, Zhong Y, et al. Practical traffic-space adversarial attacks on learning-based nidss. 2020. ArXiv:2005.07519"},{"key":"3455_CR15","unstructured":"Szegedy C, Zaremba W, Sutskever I, et al. Intriguing properties of neural networks. In: Proceedigns of the 2nd International Conference on Learning Representations (ICLR 2014), Banff, 2014"},{"key":"3455_CR16","doi-asserted-by":"crossref","unstructured":"Khamis R A, Shafiq M O, Matrawy A. Investigating resistance of deep learning-based IDS against adversaries using min-max optimization. In: Proceedigns of IEEE International Conference on Communications (ICC), 2020. 1\u20137","DOI":"10.1109\/ICC40277.2020.9149117"},{"key":"3455_CR17","doi-asserted-by":"publisher","first-page":"102367","DOI":"10.1016\/j.cose.2021.102367","volume":"109","author":"P T Duy","year":"2021","unstructured":"Duy P T, Tien L K, Khoa N H, et al. DIGFuPAS: deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks. Comput Secur, 2021, 109: 102367","journal-title":"Comput Secur"},{"key":"3455_CR18","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.procs.2018.10.315","volume":"140","author":"M Ozdag","year":"2018","unstructured":"Ozdag M. Adversarial attacks and defenses against deep neural networks: a survey. Procedia Comput Sci, 2018, 140: 152\u2013161","journal-title":"Procedia Comput Sci"},{"key":"3455_CR19","doi-asserted-by":"crossref","unstructured":"Chung S P, Mok A K. Allergy attack against automatic signa-ture generation. In: Proceedings of International Workshop on Recent Advances in Intrusion Detection, 2006. 61\u201380","DOI":"10.1007\/11856214_4"},{"key":"3455_CR20","unstructured":"Nelson B, Joseph A D. Bounding an attack\u2019s complexity for a simple learning model. In: Proceedigns of the 1st Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML), Saint-Malo, 2006"},{"key":"3455_CR21","doi-asserted-by":"crossref","unstructured":"Rubinstein B I P, Nelson B, Huang L, et al. Antidote: un-derstanding and defending against poisoning of anomaly detec-tors. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, Chicago, 2009. 1\u201314","DOI":"10.1145\/1644893.1644895"},{"key":"3455_CR22","unstructured":"Kloft M, Laskov P. Online anomaly detection under adver-sarial impact. In: Proceedings of the 13th International Conference on Artificial Intelligence and Statistics, 2010. 405\u2013412"},{"key":"3455_CR23","doi-asserted-by":"crossref","unstructured":"Li P, Liu Q, Zhao W T, et al. Chronic poisoning against machine learning based IDSs using edge pattern detection. In: Proceedings of IEEE International Conference on Communications (ICC), Kansas City, 2018. 1\u20137","DOI":"10.1109\/ICC.2018.8422328"},{"key":"3455_CR24","doi-asserted-by":"crossref","unstructured":"Li P, Zhao W T, Liu Q, et al. Poisoning machine learning based wireless IDSs via stealing learning model. In: Proceedings of International Conference on Wireless Algorithms, Systems, and Applications, Tianjin, 2018. 261\u2013273","DOI":"10.1007\/978-3-319-94268-1_22"},{"key":"3455_CR25","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q, et al. Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst, 2019, 30: 2805\u20132824","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"3455_CR26","unstructured":"Clements J, Yang Y, Sharma A, et al. Rallying adversarial techniques against deep learning for network security. 2019. ArXiv:1903.11688"},{"key":"3455_CR27","doi-asserted-by":"crossref","unstructured":"Alhajjar E, Maxwell P, Bastian N D. Adversarial machine learning in network intrusion detection systems. 2020. ArXiv:2004.11898","DOI":"10.1016\/j.eswa.2021.115782"},{"key":"3455_CR28","doi-asserted-by":"crossref","unstructured":"Rigaki M, Garcia S. Bringing a GAN to a knife-fight: adapting malware communication to avoid detection. In: Proceedings of IEEE Security and Privacy Workshops (SPW), San Francisco, 2018. 70\u201375","DOI":"10.1109\/SPW.2018.00019"},{"key":"3455_CR29","unstructured":"Charlier J, Singh A, Ormazabal G, et al. SynGAN: towards generating synthetic network attacks using GANs. 2019. ArXiv:1908.09899"},{"key":"3455_CR30","first-page":"344","volume":"45","author":"Y M Pan","year":"2019","unstructured":"Pan Y M, Lin J J. Generation and verification of malicious network flow based on generative adversarial networks. Chem J Chinese U, 2019, 45: 344\u2013350","journal-title":"Chem J Chinese U"},{"key":"3455_CR31","unstructured":"Gu T, Dolan-Gavitt B, Garg S. Badnets: identifying vulnerabilities in the machine learning model supply chain. 2017. ArXiv:1708.06733"},{"key":"3455_CR32","doi-asserted-by":"crossref","unstructured":"Parveen P, Weger Z R, Thuraisingham B, et al. Supervised learning for insider threat detection using stream mining. In: Proceedings of the 23rd International Conference on Tools with Artificial Intelligence, Boca Raton, 2011. 1032\u20131039","DOI":"10.1109\/ICTAI.2011.176"},{"key":"3455_CR33","doi-asserted-by":"publisher","first-page":"12477","DOI":"10.1111\/exsy.12477","volume":"37","author":"S Park","year":"2020","unstructured":"Park S, Seo S, Jeong C, et al. Online eigenvector transformation reflecting concept drift for improving network intrusion detection. Expert Syst, 2020, 37: 12477","journal-title":"Expert Syst"},{"key":"3455_CR34","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.neucom.2019.07.031","volume":"364","author":"G X Li","year":"2019","unstructured":"Li G X, Shen Y L, Zhao P, et al. Detecting cyberattacks in industrial control systems using online learning algorithms. Neurocomputing, 2019, 364: 338\u2013348","journal-title":"Neurocomputing"},{"key":"3455_CR35","first-page":"102717","volume":"58","author":"E Anthi","year":"2021","unstructured":"Anthi E, Williams L, Rhode M, et al. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. J Inf Secur Appl, 2021, 58: 102717","journal-title":"J Inf Secur Appl"},{"key":"3455_CR36","unstructured":"Tram\u00e8r F, Zhang F, Juels A, et al. Stealing machine learning models via prediction APIS. In: Proceedings of the 25th USENIX Security Symposium, Austin, 2016. 601\u2013618"},{"key":"3455_CR37","unstructured":"Salem A, Bhattacharya A, Backes M, et al. Updates-leak: data set inference and reconstruction attacks in online learning. In: Proceedings of the 29th USENIX Security Symposium, 2020. 1291\u20131308"},{"key":"3455_CR38","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1016\/j.knosys.2018.09.022","volume":"163","author":"J Liang","year":"2019","unstructured":"Liang J, Ma M, Sadiq M, et al. A filter model for intrusion detection system in vehicle ad hoc networks: a hidden Markov methodology. Knowl-Based Syst, 2019, 163: 611\u2013623","journal-title":"Knowl-Based Syst"},{"key":"3455_CR39","unstructured":"Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative adversarial networks. 2014. ArXiv:1406.2661"},{"key":"3455_CR40","doi-asserted-by":"publisher","first-page":"220303","DOI":"10.1007\/s11432-019-2834-x","volume":"63","author":"Y Y Qu","year":"2020","unstructured":"Qu Y Y, Zhang J W, Li R D, et al. Generative adversarial networks enhanced location privacy in 5G networks. Sci China Inf Sci, 2020, 63: 220303","journal-title":"Sci China Inf Sci"},{"key":"3455_CR41","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, et al. ImageNet large scale visual recognition challenge. Int J Comput Vis, 2015, 115: 211\u2013252","journal-title":"Int J Comput Vis"},{"key":"3455_CR42","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari A H, Ghorbani A A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of International Conference on Information Systems Security and Privacy (ICISSP), Funchal, 2018. 108\u2013116","DOI":"10.5220\/0006639801080116"},{"key":"3455_CR43","unstructured":"McAfee Labs. McAfee labs threats reports. 2021. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-threats-jun-2021.pdf"},{"key":"3455_CR44","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.cose.2019.05.019","volume":"86","author":"M Singh","year":"2019","unstructured":"Singh M, Singh M, Kaur S. Issues and challenges in DNS based botnet detection: a survey. Comput Secur, 2019, 86: 28\u201352","journal-title":"Comput Secur"},{"key":"3455_CR45","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.ins.2019.09.024","volume":"511","author":"W Wang","year":"2020","unstructured":"Wang W, Shang Y Y, He Y Z, et al. BotMark: automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf Sci, 2020, 511: 284\u2013296","journal-title":"Inf Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3455-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-021-3455-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3455-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T21:05:01Z","timestamp":1691183101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-021-3455-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":45,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["3455"],"URL":"https:\/\/doi.org\/10.1007\/s11432-021-3455-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"30 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"170303"}}