{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:41:49Z","timestamp":1775324509260,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T00:00:00Z","timestamp":1752278400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T00:00:00Z","timestamp":1752278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s13042-025-02734-6","type":"journal-article","created":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T03:16:58Z","timestamp":1752290218000},"page":"8473-8502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Resilient intrusion detection system for adversarial attacks on Low-Rate DDoS"],"prefix":"10.1007","volume":"16","author":[{"given":"Qasem","family":"Abu Al-Haija","sequence":"first","affiliation":[]},{"given":"Ayat","family":"Droos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,12]]},"reference":[{"key":"2734_CR1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.013121","author":"MA Khan","year":"2021","unstructured":"Khan MA, Rehman A, Khan KM, Al Ghamdi MA, Almotiri SH (2021) Enhance intrusion detection in computer networks based on deep extreme learning machines. Comput, Mater Continua. https:\/\/doi.org\/10.32604\/cmc.2020.013121","journal-title":"Comput, Mater Continua."},{"key":"2734_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/8379532","volume":"2022","author":"A Cheema","year":"2022","unstructured":"Cheema A, Tariq M, Hafiz A, Khan MM, Ahmad F, Anwar M (2022) Prevention techniques against distributed denial of service attacks in heterogeneous networks: a systematic review. Secur Commun Netw 2022:1\u201315","journal-title":"Secur Commun Netw"},{"key":"2734_CR3","doi-asserted-by":"publisher","first-page":"100316","DOI":"10.1016\/j.array.2023.100316","volume":"19","author":"DM Al-Fayoumi","year":"2023","unstructured":"Al-Fayoumi DM, Abu Al Haija Q (2023) Capturing Low-Rate DDoS attack based on MQTT protocol in software Defined-IoT environment. Array 19:100316","journal-title":"Array"},{"key":"2734_CR4","doi-asserted-by":"crossref","unstructured":"Droos A, Al-Haija QA, Alnabhan M (2022) Lightweight detection system for low-rate DDoS attacks on software-defined IoT. In\u00a06th Smart Cities Symposium (SCS 2022)\u00a0(Vol. 2022, pp. 157\u2013162). IET","DOI":"10.1049\/icp.2023.0388"},{"key":"2734_CR5","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Bengio Y (2014). Generative adversarial nets. Adv Neural Inf Process Syst, 27"},{"issue":"1","key":"2734_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"C Antonia","year":"2018","unstructured":"Antonia C et al (2018) Generative adversarial networks: An overview. IEEE Signal Process Magazine 35(1):53\u201365","journal-title":"IEEE Signal Process Magazine"},{"key":"2734_CR7","unstructured":"Google Developers. Generative Adversarial Networks (GANs): GAN Structure. Retrieved from https:\/\/developers.google.com\/machine-learning\/gan\/gan_structure."},{"key":"2734_CR8","doi-asserted-by":"crossref","unstructured":"Li P, Zhao W, Liu Q, Liu X, Yu L (2018) Poisoning machine learning based wireless IDSs via stealing learning model; 2018; Vol. 10874","DOI":"10.1007\/978-3-319-94268-1_22"},{"key":"2734_CR9","unstructured":"Lin Z, Shi Y, Xue Z (2018) Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv 2018.\u00a0arXiv preprint arXiv:1809.02077"},{"issue":"12","key":"2734_CR10","doi-asserted-by":"publisher","first-page":"3387","DOI":"10.1007\/s13042-019-00925-6","volume":"10","author":"Q Yan","year":"2019","unstructured":"Yan Q, Wang M, Huang W, Luo X, Yu FR (2019) Automatically synthesizing DoS attack traces using generative adversarial networks. Int J Mach Learn Cybern 10(12):3387\u20133396","journal-title":"Int J Mach Learn Cybern"},{"key":"2734_CR11","doi-asserted-by":"crossref","unstructured":"Ibitoye O, Shafiq O, Matrawy A (2019) Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1\u20136). IEEE","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"2734_CR12","doi-asserted-by":"crossref","unstructured":"Peng X, Huang W, Shi Z (2019) The adversarial attack against DoS intrusion detection: an improved boundary-based method. In\u00a02019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)\u00a0(pp. 1288\u20131295). IEEE","DOI":"10.1109\/ICTAI.2019.00179"},{"key":"2734_CR13","doi-asserted-by":"crossref","unstructured":"Hashemi MJ, Cusack G, Keller E (2019) Towards the evaluation of bids in an adversarial setting. In Proceedings of the 3rd ACM CoNEXT Workshop on Big Data, Machine Learning, and Artificial Intelligence for Data Communication Networks (pp. 14\u201321).","DOI":"10.1145\/3359992.3366642"},{"key":"2734_CR14","doi-asserted-by":"crossref","unstructured":"Kuppa A, Grzonkowski S, Asghar MR, Le-Khac NA (2019) Black box attacks on deep anomaly detectors. In\u00a0Proceedings of the 14th International Conference on Availability, Reliability, and Security\u00a0(pp. 1\u201310)","DOI":"10.1145\/3339252.3339266"},{"key":"2734_CR15","doi-asserted-by":"crossref","unstructured":"Aiken J, Scott-Hayward S (2019) Investigating adversarial attacks against network intrusion detection systems in Sins. In\u00a02019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)\u00a0(pp. 1\u20137). IEEE","DOI":"10.1109\/NFV-SDN47374.2019.9040101"},{"key":"2734_CR16","doi-asserted-by":"crossref","unstructured":"Usama M, Qayyum A, Qadir J, Al-Fuqaha A (2019) Black-box adversarial machine learning attack on network traffic classification. In\u00a02019, 15th International Wireless Communications & Mobile Computing Conference (IWCMC)\u00a0(pp. 84\u201389). IEEE","DOI":"10.1109\/IWCMC.2019.8766505"},{"issue":"5","key":"2734_CR17","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.ifacol.2021.04.118","volume":"53","author":"X Zhang","year":"2020","unstructured":"Zhang X, Zheng X, Wu DD (2020) Attacking DNN-based intrusion detection models. IFAC-PapersOnLine 53(5):415\u2013419","journal-title":"IFAC-PapersOnLine"},{"key":"2734_CR18","doi-asserted-by":"crossref","unstructured":"Huang W, Peng X, Shi Z, Ma Y (2020) The adversarial attack against an LSTM-based DDoS intrusion detection system. In\u00a02020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)\u00a0(pp. 686\u2013693). IEEE","DOI":"10.1109\/ICTAI50040.2020.00110"},{"key":"2734_CR19","doi-asserted-by":"crossref","unstructured":"Chauhan R, Heydari SS (2020) Polymorphic adversarial DDoS attack on IDS using GAN. In\u00a02020 International Symposium on Networks, Computers, and Communications (ISNCC)\u00a0(pp. 1\u20136). IEEE","DOI":"10.1109\/ISNCC49221.2020.9297264"},{"issue":"13","key":"2734_CR20","doi-asserted-by":"publisher","first-page":"10327","DOI":"10.1109\/JIOT.2020.3048038","volume":"8","author":"H Qiu","year":"2020","unstructured":"Qiu H, Dong T, Zhang T, Lu J, Memmi G, Qiu M (2020) Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J 8(13):10327\u201310335","journal-title":"IEEE Internet Things J"},{"key":"2734_CR21","doi-asserted-by":"crossref","unstructured":"Mirsky Y, Tshman T, Elovici Y, Shabtai A (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089","DOI":"10.14722\/ndss.2018.23204"},{"key":"2734_CR22","doi-asserted-by":"publisher","first-page":"128250","DOI":"10.1109\/ACCESS.2020.3008433","volume":"8","author":"S Zhang","year":"2020","unstructured":"Zhang S, Xie X, Xu Y (2020) A brute-force black-box method to attack machine learning-based systems in cybersecurity. IEEE Access 8:128250\u2013128263","journal-title":"IEEE Access"},{"key":"2734_CR23","doi-asserted-by":"crossref","unstructured":"Shu D, Leslie NO, Kamhoua CA, Tucker CS (2020) Generative adversarial attacks against intrusion detection systems using active learning. In\u00a0Proceedings of the 2nd ACM workshop on wireless security and machine learning\u00a0(pp. 1\u20136)","DOI":"10.1145\/3395352.3402618"},{"key":"2734_CR24","doi-asserted-by":"crossref","unstructured":"Khamaiseh SY, Alsmadi I, Al-Alaj A (2020) Deceiving machine learning-based saturation attack detection systems in SDN. In\u00a02020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)\u00a0(pp. 44\u201350). IEEE","DOI":"10.1109\/NFV-SDN50289.2020.9289908"},{"key":"2734_CR25","first-page":"102717","volume":"58","author":"E Anthi","year":"2021","unstructured":"Anthi E, Williams L, Rhode M, Burnap P, Wedgbury A (2021) Adversarial attacks on machine learning cybersecurity defenses in industrial control systems. J Inform Secur Appl 58:102717","journal-title":"J Inform Secur Appl"},{"key":"2734_CR26","doi-asserted-by":"publisher","first-page":"115782","DOI":"10.1016\/j.eswa.2021.115782","volume":"186","author":"E Alhajjar","year":"2021","unstructured":"Alhajjar E, Maxwell P, Bastian N (2021) Adversarial machine learning in network intrusion detection systems. Expert Syst Appl 186:115782","journal-title":"Expert Syst Appl"},{"key":"2734_CR27","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","volume":"187","author":"S Zhao","year":"2021","unstructured":"Zhao S, Li J, Wang J, Zhang Z, Zhu L, Zhang Y (2021) attackgan: Adversarial attack against black-box IDs using generative adversarial networks. Procedia Computer Sci 187:128\u2013133","journal-title":"Procedia Computer Sci"},{"key":"2734_CR28","unstructured":"Zolbayar BE, Sheatsley R, McDaniel P, Weisman MJ, Zhu S, Zhu S, Krishnamurthy S (2022) Generating practical adversarial network traffic flows using NIDSGAN\u2014arXiv preprint arXiv:2203.06694"},{"key":"2734_CR29","unstructured":"Mendeley Data (2022). Dataset Title [Low Rate DDoS]. Retrieved from https:\/\/data.mendeley.com\/datasets\/bzf9jcvhx4\/1"},{"key":"2734_CR30","doi-asserted-by":"publisher","unstructured":"Bruno DL, Vinicius DM, Jeferson NC (2019) \"Public dataset for evaluating Port Scan and Slowloris attacks,\u201d https:\/\/doi.org\/10.7910\/DVN\/ZJOT5G, Harvard Dataverse, V1","DOI":"10.7910\/DVN\/ZJOT5G"},{"issue":"5","key":"2734_CR31","doi-asserted-by":"publisher","first-page":"215","DOI":"10.3390\/info12050215","volume":"12","author":"K Fotiadou","year":"2021","unstructured":"Fotiadou K, Velivassaki TH, Voulkidis A, Skias D, Tsekeridou S, Zahariadis T (2021) Network traffic anomaly detection via deep learning. Information 12(5):215","journal-title":"Information"},{"key":"2734_CR32","unstructured":"Ramanathan V, Mahadevan K, Dua S (2023). A novel supervised deep learning solution to detect distributed denial of service (DDoS) attacks on edge systems using convolutional neural networks (CNN).\u00a0arXiv preprint arXiv:2309.05646."},{"key":"2734_CR33","unstructured":"Mordido G, Yang H, Meinel C (2018) Dropout-gan: Learning from a dynamic ensemble of discriminators. arXiv preprint arXiv:1807.11346"},{"key":"2734_CR34","unstructured":"Ibitoye O, Shafiq O, Matrawy A (2022) Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. IEEE GLOBECOM"},{"key":"2734_CR35","unstructured":"Zolbayar B et al. (2022) Generating practical adversarial network traffic flows using NIDSGAN. arXiv:2203.06694"},{"key":"2734_CR36","unstructured":"Kuppa A et al. (2023). Black box attacks on deep anomaly detectors. ARES Conference"},{"key":"2734_CR37","unstructured":"Ramanathan V, Mahadevan K, Dua S (2023) A novel deep learning solution to detect DDoS on edge systems using CNN. arXiv:2309.05646"},{"key":"2734_CR38","unstructured":"Zhang S et al. (2024) BiGAN-enhanced adversarial traffic generation for network intrusion. J Netw Secur Appl"},{"key":"2734_CR39","doi-asserted-by":"publisher","first-page":"115782","DOI":"10.1016\/j.eswa.2021.115782","volume":"186","author":"E Alhajjar","year":"2024","unstructured":"Alhajjar E et al (2024) Adversarial machine learning in network intrusion detection systems. Expert Syst Appl 186:115782","journal-title":"Expert Syst Appl"},{"key":"2734_CR40","unstructured":"Lee J, Kim H (2025) Transformer-based IDS for detecting Low-Rate DDoS in real-time networks. Computers Secur"},{"key":"2734_CR41","unstructured":"Nassar M, Fares B, Ahmed S (2025) Hybrid GAN-Autoencoder model for adversarial evasion in network IDS. Future Internet J"},{"key":"2734_CR42","doi-asserted-by":"publisher","unstructured":"Hostiadi DP, Atmojo YP, Huizen RR, Susila IMD, Pradipta GA, Liandana IM (2022) \"A New Approach Feature Selection for Intrusion Detection System Using Correlation Analysis,\" 2022 4th International Conference on Cybernetics and Intelligent System (ICORIS), Prapat, Indonesia, 2022, pp. 1\u20136, https:\/\/doi.org\/10.1109\/ICORIS56080.2022.10031468","DOI":"10.1109\/ICORIS56080.2022.10031468"},{"key":"2734_CR43","first-page":"457","volume":"1","author":"P Mohammad Reza","year":"2016","unstructured":"Mohammad Reza P, Taheri R, Javidan R (2016) Perusing the effect of discretization of data on the accuracy of predicting the naive bayes algorithm. J Current Res Sci 1:457","journal-title":"J Current Res Sci"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02734-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02734-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02734-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:01:02Z","timestamp":1760547662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02734-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,12]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2734"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02734-6","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,12]]},"assertion":[{"value":"3 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}