{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:28:06Z","timestamp":1776281286514,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s13042-024-02506-8","type":"journal-article","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T07:23:37Z","timestamp":1735370617000},"page":"4213-4234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["NIDS-CBAD: detecting adversarial attacks in network intrusion detection systems using domain constraints"],"prefix":"10.1007","volume":"16","author":[{"given":"Vivek","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Kamal","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Maheep","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,28]]},"reference":[{"issue":"5","key":"2506_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MNET.101.2100052","volume":"35","author":"M Dai","year":"2021","unstructured":"Dai M, Su Z, Li R, Yu S (2021) A software-defined-networking-enabled approach for edge-cloud computing in the internet of things. IEEE Netw 35(5):66\u201373","journal-title":"IEEE Netw"},{"issue":"1","key":"2506_CR2","first-page":"019","volume":"7","author":"KL Snider","year":"2021","unstructured":"Snider KL, Shandler R, Zandani S, Canetti D (2021) Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. J Cybersecur 7(1):019","journal-title":"J Cybersecur"},{"key":"2506_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-91293-2_1","volume-title":"Cyber security: critical infrastructure protection","author":"M Lehto","year":"2022","unstructured":"Lehto M (2022) Cyber-attacks against critical infrastructure. Cyber security: critical infrastructure protection. Springer, Berlin, pp 3\u201342"},{"key":"2506_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123027","volume":"245","author":"R Devendiran","year":"2024","unstructured":"Devendiran R, Turukmane AV (2024) Dugat-LSTM: deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst Appl 245:123027","journal-title":"Expert Syst Appl"},{"key":"2506_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6639714","volume":"2021","author":"S Einy","year":"2021","unstructured":"Einy S, Oz C, Navaei YD (2021) The anomaly-and signature-based ids for network security using hybrid inference systems. Math Probl Eng 2021:1\u201310","journal-title":"Math Probl Eng"},{"key":"2506_CR6","doi-asserted-by":"publisher","first-page":"90603","DOI":"10.1109\/ACCESS.2021.3090957","volume":"9","author":"T Zoppi","year":"2021","unstructured":"Zoppi T, Ceccarelli A, Bondavalli A (2021) Unsupervised algorithms to detect zero-day attacks: strategy and application. IEEE Access 9:90603\u201390615","journal-title":"IEEE Access"},{"issue":"1","key":"2506_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/cit2.12028","volume":"6","author":"A Chakraborty","year":"2021","unstructured":"Chakraborty A, Alam M, Dey V, Chattopadhyay A, Mukhopadhyay D (2021) A survey on adversarial attacks and defences. CAAI Trans Intell Technol 6(1):25\u201345","journal-title":"CAAI Trans Intell Technol"},{"issue":"1","key":"2506_CR8","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","volume":"25","author":"K He","year":"2023","unstructured":"He K, Kim DD, Asghar MR (2023) Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Commun Surv Tutor 25(1):538\u2013566","journal-title":"IEEE Commun Surv Tutor"},{"key":"2506_CR9","doi-asserted-by":"crossref","unstructured":"Sheatsley R, Hoak B, Pauley E, Beugin Y, Weisman MJ, McDaniel P (2021) On the robustness of domain constraints. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pp 495\u2013515","DOI":"10.1145\/3460120.3484570"},{"key":"2506_CR10","doi-asserted-by":"crossref","unstructured":"Lin Z, Shi Y, Xue Z (2022) IDSGAN: generative adversarial networks for attack generation against intrusion detection. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 79\u201391","DOI":"10.1007\/978-3-031-05981-0_7"},{"key":"2506_CR11","unstructured":"Zolbayar B-E, Sheatsley R, McDaniel P, Weisman MJ, Zhu S, Zhu S, Krishnamurthy S (2022) Generating practical adversarial network traffic flows using NIDSGAN. arXiv preprint arXiv:2203.06694"},{"key":"2506_CR12","unstructured":"Debicha I, Debatty T, Dricot J-M, Mees W (2021) Adversarial training for deep learning-based intrusion detection systems. arXiv preprint arXiv:2104.09852"},{"issue":"3","key":"2506_CR13","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TNET.2021.3137084","volume":"30","author":"C Zhang","year":"2022","unstructured":"Zhang C, Costa-Perez X, Patras P (2022) Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms. IEEE\/ACM Trans Netw 30(3):1294\u20131311","journal-title":"IEEE\/ACM Trans Netw"},{"key":"2506_CR14","unstructured":"Cheng Q, Zhou S, Shen Y, Kong D, Wu C (2021) Packet-level adversarial network traffic crafting using sequence generative adversarial networks. arXiv preprint arXiv:2103.04794"},{"key":"2506_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115782","volume":"186","author":"E Alhajjar","year":"2021","unstructured":"Alhajjar E, Maxwell P, Bastian N (2021) Adversarial machine learning in network intrusion detection systems. Expert Syst Appl 186:115782","journal-title":"Expert Syst Appl"},{"key":"2506_CR16","doi-asserted-by":"crossref","unstructured":"Usama M, Asim M, Latif S, Qadir J et al (2019) Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 2019 15th international wireless communications & mobile computing conference (IWCMC). IEEE, pp 78\u201383","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"2506_CR17","doi-asserted-by":"crossref","unstructured":"Hashemi MJ, Cusack G, Keller E (2019) Towards evaluation of NIDSs in adversarial setting. In: Proceedings of the 3rd ACM CoNEXT workshop on Big DAta, machine learning and artificial intelligence for data communication networks, pp 14\u201321","DOI":"10.1145\/3359992.3366642"},{"key":"2506_CR18","doi-asserted-by":"crossref","unstructured":"Khettaf D, Bouzar-Benlabiod L (2024) Defending the defender: detecting adversarial examples for network intrusion detection systems. In 2024 IEEE International Conference on Information Reuse and Integration for Data Science (IRI). IEEE, pp 150\u2013155","DOI":"10.1109\/IRI62200.2024.00040"},{"issue":"2","key":"2506_CR19","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1109\/TDSC.2022.3148990","volume":"20","author":"N Wang","year":"2022","unstructured":"Wang N, Chen Y, Xiao Y, Hu Y, Lou W, Hou YT (2022) Manda: On adversarial example detection for network intrusion detection system. IEEE Trans Depend Secure Comput 20(2):1139\u20131153","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2506_CR20","doi-asserted-by":"publisher","unstructured":"Peng Y, Fu G, Luo Y, Hu J, Li B, Yan Q (2020) Detecting adversarial examples for network intrusion detection system with GAN. In: 2020 IEEE 11th international conference on software engineering and service science (ICSESS), pp 6\u201310. https:\/\/doi.org\/10.1109\/ICSESS49938.2020.9237728","DOI":"10.1109\/ICSESS49938.2020.9237728"},{"key":"2506_CR21","doi-asserted-by":"crossref","unstructured":"Hashemi MJ, Keller E (2020) Enhancing robustness against adversarial examples in network intrusion detection systems. In: 2020 IEEE conference on network function virtualization and software defined networks (NFV-SDN). IEEE, pp 37\u201343","DOI":"10.1109\/NFV-SDN50289.2020.9289869"},{"key":"2506_CR22","doi-asserted-by":"crossref","unstructured":"Zhang C, Costa-P\u00e9rez X, Patras P (2020) Tiki-Taka: attacking and defending deep learning-based intrusion detection systems. In: Proceedings of the 2020 ACM SIGSAC conference on cloud computing security workshop, pp 27\u201339","DOI":"10.1145\/3411495.3421359"},{"key":"2506_CR23","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.future.2020.04.013","volume":"110","author":"M Pawlicki","year":"2020","unstructured":"Pawlicki M, Chora\u015b M, Kozik R (2020) Defending network intrusion detection systems against adversarial evasion attacks. Future Gener Comput Syst 110:148\u2013154","journal-title":"Future Gener Comput Syst"},{"key":"2506_CR24","doi-asserted-by":"crossref","unstructured":"Xu W, Evans D, Qi Y (2017) Feature squeezing: detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155","DOI":"10.14722\/ndss.2018.23198"},{"key":"2506_CR25","doi-asserted-by":"publisher","first-page":"103483","DOI":"10.1016\/j.cose.2023.103483","volume":"135","author":"A Sar\u0131kaya","year":"2023","unstructured":"Sar\u0131kaya A, K\u0131l\u0131\u00e7 BG, Demirci M (2023) RAIDS: robust autoencoder-based intrusion detection system model against adversarial attacks. Comput Secur 135:103483","journal-title":"Comput Secur"},{"key":"2506_CR26","doi-asserted-by":"crossref","unstructured":"Zhang Y, Song Y, Liang J, Bai K, Yang Q (2020) Two sides of the same coin: white-box and black-box attacks for transfer learning. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2989\u20132997","DOI":"10.1145\/3394486.3403349"},{"key":"2506_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/0471704091","volume-title":"Applied linear regression","author":"S Weisberg","year":"2005","unstructured":"Weisberg S (2005) Applied linear regression, vol 528. Wiley, New York"},{"key":"2506_CR28","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"2506_CR29","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world. In: Artificial intelligence safety and security. Chapman and Hall\/CRC, pp 99\u2013112","DOI":"10.1201\/9781351251389-8"},{"key":"2506_CR30","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083"},{"key":"2506_CR31","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"2506_CR32","doi-asserted-by":"crossref","unstructured":"Peng X, Huang W, Shi Z (2019) Adversarial attack against dos intrusion detection: an improved boundary-based method. In: 2019 IEEE 31st international conference on tools with artificial intelligence (ICTAI). IEEE, pp 1288\u20131295","DOI":"10.1109\/ICTAI.2019.00179"},{"key":"2506_CR33","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2506_CR34","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA et al (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108\u2013116","journal-title":"ICISSp"},{"key":"2506_CR35","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS). IEEE, pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"2506_CR36","doi-asserted-by":"crossref","unstructured":"Wang X, He K (2021) Enhancing the transferability of adversarial attacks through variance tuning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 1924\u20131933","DOI":"10.1109\/CVPR46437.2021.00196"},{"issue":"3","key":"2506_CR37","doi-asserted-by":"publisher","first-page":"4179","DOI":"10.1007\/s13369-023-08315-5","volume":"49","author":"Y Alslman","year":"2024","unstructured":"Alslman Y, Alkasassbeh M, Almseidin M (2024) A robust SNMP-MIB intrusion detection system against adversarial attacks. Arab J Sci Eng 49(3):4179\u20134195","journal-title":"Arab J Sci Eng"},{"key":"2506_CR38","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.comcom.2023.09.030","volume":"218","author":"K Roshan","year":"2024","unstructured":"Roshan K, Zafar A, Haque SBU (2024) Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system. Comput Commun 218:97\u2013113","journal-title":"Comput Commun"},{"key":"2506_CR39","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.future.2022.08.011","volume":"138","author":"I Debicha","year":"2023","unstructured":"Debicha I, Bauwens R, Debatty T, Dricot J-M, Kenaza T, Mees W (2023) TAD: transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems. Future Gener Comput Syst 138:185\u2013197","journal-title":"Future Gener Comput Syst"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02506-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02506-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02506-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T03:59:46Z","timestamp":1757131186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02506-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,28]]},"references-count":39,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2506"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02506-8","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,28]]},"assertion":[{"value":"3 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}