{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:30Z","timestamp":1773615690676,"version":"3.50.1"},"reference-count":33,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s014641162470086x","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:01Z","timestamp":1741962181000},"page":"1226-1233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems"],"prefix":"10.3103","volume":"58","author":[{"given":"P. E.","family":"Yugai","sequence":"first","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7785_CR1","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/fi15020062","volume":"15","author":"A. Alotaibi","year":"2023","unstructured":"Alotaibi, A. and Rassam, M.A., Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense, Future Internet, 2023, vol. 15, no. 2, p. 62. https:\/\/doi.org\/10.3390\/fi15020062","journal-title":"Future Internet"},{"key":"7785_CR2","doi-asserted-by":"publisher","unstructured":"Wang, N., Chen, Yi., Hu, Ya., Lou, W., and Hou, Y.T., MANDA: On adversarial example detection for network intrusion detection system, IEEE INFOCOM 2021\u2014IEEE Conference on Computer Communications, Vancouver, 2021, IEEE, 2021, pp. 1\u201310. https:\/\/doi.org\/10.1109\/infocom42981.2021.9488874","DOI":"10.1109\/infocom42981.2021.9488874"},{"key":"7785_CR3","doi-asserted-by":"publisher","first-page":"916","DOI":"10.3103\/S014641162208003X","volume":"56","author":"V.D. Danilov","year":"2022","unstructured":"Danilov, V.D., Ovasapyan, T.D., Ivanov, D.V., Konoplev, A.S., and Moskvin, D.A., Generation of synthetic data for honeypot systems using deep learning methods, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp.\u00a0916\u2013926. https:\/\/doi.org\/10.3103\/S014641162208003X","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR4","doi-asserted-by":"publisher","first-page":"7507","DOI":"10.3390\/app13137507","volume":"13","author":"P. Dini","year":"2023","unstructured":"Dini, P., Elhanashi, A., Begni, A., Saponara, S., Zheng, Q., and Gasmi, K., Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity, Appl. Sci., 2023, vol. 13, no. 13, p. 7507. https:\/\/doi.org\/10.3390\/app13137507","journal-title":"Appl. Sci."},{"key":"7785_CR5","doi-asserted-by":"publisher","first-page":"983","DOI":"10.3103\/s0146411623080072","volume":"57","author":"M.O. Kalinin","year":"2023","unstructured":"Kalinin, M.O., Suprun, A.F., and Ivanova, O.D., Hybrid method for the detection of evasion attacks aimed at machine learning systems, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 983\u2013988. https:\/\/doi.org\/10.3103\/s0146411623080072","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR6","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.3103\/s0146411621080174","volume":"55","author":"D.A. Kulikov","year":"2021","unstructured":"Kulikov, D.A. and Platonov, V.V., Adversarial attacks on intrusion detection systems using the LSTM classifier, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1080\u20131086. https:\/\/doi.org\/10.3103\/s0146411621080174","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3390\/computers9030058","volume":"9","author":"A.U.H. Qureshi","year":"2020","unstructured":"Qureshi, A.U.H., Larijani, H., Yousefi, M., Adeel, A., and Mtetwa, N., An adversarial approach for intrusion detection systems using Jacobian saliency map attacks (JSMA) algorithm, Computers, 2020, vol. 9, no. 3, p. 58. https:\/\/doi.org\/10.3390\/computers9030058","journal-title":"Computers"},{"key":"7785_CR8","doi-asserted-by":"publisher","first-page":"170303","DOI":"10.1007\/s11432-021-3455-1","volume":"65","author":"G. Liu","year":"2022","unstructured":"Liu, G., Zhang, W., Li, X., Fan, K., and Yu, Sh., VulnerGAN: A backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems, Sci. China: Inf. Sci., 2022, vol. 65, no. 7, p. 170303. https:\/\/doi.org\/10.1007\/s11432-021-3455-1","journal-title":"Sci. China: Inf. Sci."},{"key":"7785_CR9","doi-asserted-by":"publisher","unstructured":"Aleksandrova, E., Pendrikova, O., Shtyrkina, A., Shkorkina, E., Yarmak, A., and Tick, J., Threshold isogeny-based group authentication scheme, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 117\u2013126. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_10","DOI":"10.1007\/978-3-030-93872-7_10"},{"key":"7785_CR10","doi-asserted-by":"publisher","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., and Frossard, P., DeepFool: A simple and accurate method to fool deep neural networks, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 2016, IEEE, 2016, pp. 2574\u20132582. https:\/\/doi.org\/10.1109\/cvpr.2016.282","DOI":"10.1109\/cvpr.2016.282"},{"key":"7785_CR11","doi-asserted-by":"publisher","first-page":"991","DOI":"10.3103\/s0146411621080241","volume":"55","author":"T.D. Ovasapyan","year":"2021","unstructured":"Ovasapyan, T.D., Danilov, V.D., and Moskvin, D.A., Application of synthetic data generation methods to the detection of network attacks on internet of things devices, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp.\u00a0991\u2013998. https:\/\/doi.org\/10.3103\/s0146411621080241","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR12","doi-asserted-by":"publisher","first-page":"932","DOI":"10.3103\/s014641162108023x","volume":"55","author":"T.D. Ovasapyan","year":"2021","unstructured":"Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Automated search for vulnerabilities in ARM software using dynamic symbolic execution, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 932\u2013940. https:\/\/doi.org\/10.3103\/s014641162108023x","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR13","doi-asserted-by":"publisher","unstructured":"Orekondy, T., Schiele, B., and Fritz, M., Knockoff nets: Stealing functionality of black-box models, 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, 2018, IEEE, 2018, pp. 4949\u20134958. https:\/\/doi.org\/10.1109\/cvpr.2019.00509","DOI":"10.1109\/cvpr.2019.00509"},{"key":"7785_CR14","doi-asserted-by":"publisher","first-page":"252","DOI":"10.3390\/jcp1020014","volume":"1","author":"P. Papadopoulos","year":"2021","unstructured":"Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, Ch., Mylonas, A., and Buchanan, W.J., Launching adversarial attacks against network intrusion detection systems for IoT, Journal of Cybersecurity and Privacy, 2021, vol. 1, no. 2, pp. 252\u2013273. https:\/\/doi.org\/10.3390\/jcp1020014","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"7785_CR15","doi-asserted-by":"publisher","unstructured":"Pujari, M., Cherukuri, B.P., Javaid, A.Y., and Sun, W., An approach to improve the robustness of machine learning based intrusion detection system models against the Carlini\u2013Wagner attack, 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 2022, IEEE, 2022. https:\/\/doi.org\/10.1109\/csr54599.2022.9850306","DOI":"10.1109\/csr54599.2022.9850306"},{"key":"7785_CR16","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.3390\/en15114123","volume":"15","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https:\/\/doi.org\/10.3390\/en15114123","journal-title":"Energies"},{"key":"7785_CR17","doi-asserted-by":"publisher","first-page":"107830","DOI":"10.1016\/j.patcog.2021.107830","volume":"113","author":"J.R. Correia-Silva","year":"2021","unstructured":"Correia-Silva, J.R., Berriel, R.F., Badue, C., De Souza, A.F., and Oliveira-Santos, T., Copycat CNN: Are random non-Labeled data enough to steal knowledge from black-box models?, Pattern Recognit., 2021, vol. 113, p.\u00a0107830. https:\/\/doi.org\/10.1016\/j.patcog.2021.107830","journal-title":"Pattern Recognit."},{"key":"7785_CR18","doi-asserted-by":"publisher","first-page":"996","DOI":"10.3103\/s0146411623080084","volume":"57","author":"M.O. Kalinin","year":"2023","unstructured":"Kalinin, M.O., Soshnev, M.D., and Konoplev, A.S., Protection of computational machine learning models against extraction threat, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 996\u20131004. https:\/\/doi.org\/10.3103\/s0146411623080084","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR19","doi-asserted-by":"publisher","unstructured":"Fredrikson, M., Jha, S., and Ristenpart, T., Model inversion attacks that exploit confidence information and basic countermeasures, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, New York: Association for Computing Machinery, 2015, pp. 1322\u20131333. https:\/\/doi.org\/10.1145\/2810103.2813677","DOI":"10.1145\/2810103.2813677"},{"key":"7785_CR20","doi-asserted-by":"publisher","first-page":"954","DOI":"10.3103\/s0146411619080030","volume":"53","author":"E.B. Aleksandrova","year":"2019","unstructured":"Aleksandrova, E.B., Lavrova, D.S., and Yarmak, A.V., Benford\u2019s law in the detection of DoS attacks on industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 954\u2013962. https:\/\/doi.org\/10.3103\/s0146411619080030","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR21","doi-asserted-by":"publisher","unstructured":"Hashemi, M.J. and Keller, E., Enhancing robustness against adversarial examples in network intrusion detection systems, 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Leganes, Spain, 2020, IEEE, 2020, pp. 37\u201343. https:\/\/doi.org\/10.1109\/nfv-sdn50289.2020.9289869","DOI":"10.1109\/nfv-sdn50289.2020.9289869"},{"key":"7785_CR22","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3969\/j.issn.0372-2112.2019.01.008","volume":"47","author":"Y.-G. Qian","year":"2019","unstructured":"Qian, Y.-G., Lu, H.-B., Ji, S.-L., Zhou, W.-J., Wu, S.-H., Lei, J.-S., and Tao, X.-X., A poisoning attack on intrusion detection system based on SVM, Tien Tzu Hsueh Pao\/Acta Electronica Sinica, 2019, vol. 47, pp. 59\u201365. https:\/\/doi.org\/10.3969\/j.issn.0372-2112.2019.01.008","journal-title":"Acta Electronica Sinica"},{"key":"7785_CR23","doi-asserted-by":"publisher","first-page":"786","DOI":"10.3103\/s0146411620080179","volume":"54","author":"V.M. Krundyshev","year":"2020","unstructured":"Krundyshev, V.M., Ensuring cybersecurity of digital production using modern neural network methods, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 786\u2013792. https:\/\/doi.org\/10.3103\/s0146411620080179","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR24","doi-asserted-by":"publisher","first-page":"968","DOI":"10.3103\/s0146411620080283","volume":"54","author":"M.A. Poltavtseva","year":"2020","unstructured":"Poltavtseva, M.A. and Zegzhda, D.P., Building an adaptive system for collecting and preparing data for security monitoring, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 968\u2013976. https:\/\/doi.org\/10.3103\/s0146411620080283","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR25","doi-asserted-by":"publisher","unstructured":"Catak, F.O. and Yayilgan, S.Y., Deep neural network based malicious network activity detection under adversarial machine learning attacks, Intelligent Technologies and Applications. INTAP 2020, Yildirim Yayilgan, S., Bajwa, I.S., and Sanfilippo, F., Eds., Communications in Computer and Information Science, vol. 1382, Cham: Springer, 2020, pp. 280\u2013291. https:\/\/doi.org\/10.1007\/978-3-030-71711-7_23","DOI":"10.1007\/978-3-030-71711-7_23"},{"key":"7785_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, Ch., Costa-Perez, X., and Patras, P., Tiki-Taka: Attacking and defending deep learning-based intrusion detection systems, Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, New York: Association for Computing Machinery, 2020, pp. 27\u201339. https:\/\/doi.org\/10.1145\/3411495.3421359","DOI":"10.1145\/3411495.3421359"},{"key":"7785_CR27","unstructured":"Zhu, C., Huang, W.R., Shafahi, A., Li, H., Taylor, G., Studer, C., Goldstein, T., and Huang, R., Transferable clean-label poisoning attacks on deep neural nets, Proceedings of Machine Learning Research, 2019, vol. 97, pp.\u00a07614\u20137623. https:\/\/proceedings.mlr.press\/v97\/zhu19a.html."},{"key":"7785_CR28","doi-asserted-by":"publisher","first-page":"949","DOI":"10.3103\/s0146411621080216","volume":"55","author":"A.V. Myasnikov","year":"2021","unstructured":"Myasnikov, A.V., Konoplev, A.S., Suprun, A.F., Anisimov, V.G., Kasatkin, V.V., and Los\u2019, V.P., Constructing the model of an information system for the automatization of penetration testing, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 949\u2013955. https:\/\/doi.org\/10.3103\/s0146411621080216","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR29","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zegzhda, D., AI methods for neutralizing cyber threats at unmanned vehicular ecosystem of smart city, The Economics of Digital Transformation, Devezas, T., Leit\u00e3o, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp.\u00a0157\u2013171. https:\/\/doi.org\/10.1007\/978-3-030-59959-1_10","DOI":"10.1007\/978-3-030-59959-1_10"},{"key":"7785_CR30","doi-asserted-by":"publisher","first-page":"e13520","DOI":"10.1016\/j.heliyon.2023.e13520","volume":"9","author":"Sh. Li","year":"2023","unstructured":"Li, Sh., Wang, J., Wang, Yu., Zhou, G., and Zhao, Ya., EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT, Heliyon, 2023, vol. 9, no. 2, p. e13520. https:\/\/doi.org\/10.1016\/j.heliyon.2023.e13520","journal-title":"Heliyon"},{"key":"7785_CR31","doi-asserted-by":"publisher","first-page":"996","DOI":"10.3103\/s0146411623080084","volume":"57","author":"M.O. Kalinin","year":"2023","unstructured":"Kalinin, M.O., Soshnev, M.D., and Konoplev, A.S., Protection of computational machine learning models against extraction threat, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 996\u20131004. https:\/\/doi.org\/10.3103\/s0146411623080084","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR32","doi-asserted-by":"publisher","first-page":"983","DOI":"10.3103\/s0146411623080072","volume":"57","author":"M.O. Kalinin","year":"2023","unstructured":"Kalinin, M.O., Suprun, A.F., and Ivanova, O.D., Hybrid method for the detection of evasion attacks aimed at machine learning systems, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 983\u2013988. https:\/\/doi.org\/10.3103\/s0146411623080072","journal-title":"Autom. Control Comput. Sci."},{"key":"7785_CR33","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","volume":"19","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M. and Krundyshev, V., Security intrusion detection using quantum machine learning techniques, J.\u00a0Comput. Virol. Hacking Tech., 2022, vol. 19, no. 1, pp. 125\u2013136. https:\/\/doi.org\/10.1007\/s11416-022-00435-0","journal-title":"J.\u00a0Comput. Virol. Hacking Tech."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162470086X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162470086X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162470086X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:22Z","timestamp":1773612202000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162470086X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7785"],"URL":"https:\/\/doi.org\/10.3103\/s014641162470086x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"5 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}