Home|Journals|Articles by Year|Audio Abstracts
 

Research Article

EEO. 2021; 20(4): 4829-4841


Intrusion Detection Systems Vulnerability To Adversarial Examples

Manisha Aeri.




Abstract

Because they are able to identify and neutralise possible risks to network security, intrusion detection systems, more commonly abbreviated as IDS, are an absolute requirement for the protection of computer networks. Recent advancements in the field of adversarial machine learning suggest that intrusion detection systems, sometimes known as IDSs, may be susceptible to assaults that make advantage of adversarial examples. In the field of machine learning, adversarial examples are data points that have been purposely constructed with the goal of deceiving machine learning models into producing erroneous classifications or false negatives. This may be accomplished by presenting the models with data that has been tampered with in some way. This research project will investigate the vulnerabilities of intrusion detection systems (IDSs) to adversarial examples. It will also investigate the probable implications of such attacks on network security, and it will suggest feasible defensive strategies in order to enhance the resistance of IDSs against these threats. The overall purpose of this research is to improve the resistance of IDSs to the many dangers that they face.

Key words: IDS, network, detection, classification.






Full-text options


Share this Article


Online Article Submission
• ejmanager.com




ejPort - eJManager.com
Refer & Earn
JournalList
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.