{"id":"https://openalex.org/W3113651845","doi":"https://doi.org/10.1109/nfv-sdn50289.2020.9289869","title":"Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems","display_name":"Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems","publication_year":2020,"publication_date":"2020-11-10","ids":{"openalex":"https://openalex.org/W3113651845","doi":"https://doi.org/10.1109/nfv-sdn50289.2020.9289869","mag":"3113651845"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn50289.2020.9289869","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://arxiv.org/pdf/2008.03677","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035739274","display_name":"Mohammad Hashemi","orcid":"https://orcid.org/0000-0002-9585-6607"},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad J. Hashemi","raw_affiliation_strings":["Department of Computer Science, University of Colorado Boulder, Boulder, CO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Colorado Boulder, Boulder, CO, USA","institution_ids":["https://openalex.org/I188538660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025861504","display_name":"Eric Keller","orcid":"https://orcid.org/0000-0003-2556-9394"},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric Keller","raw_affiliation_strings":["Department of Electrical Computer and Energy Engineering, University of Colorado Boulder, Boulder, CO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Computer and Energy Engineering, University of Colorado Boulder, Boulder, CO, USA","institution_ids":["https://openalex.org/I188538660"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.555,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.999945,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness","score":0.6863532}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7773329},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6883937},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6863532},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.59664226},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.51214194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4938522},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46745285},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44495785},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.43716824},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.42510244},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37873888},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35988006},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3574322},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn50289.2020.9289869","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2008.03677","pdf_url":"http://arxiv.org/pdf/2008.03677","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2008.03677","pdf_url":"http://arxiv.org/pdf/2008.03677","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.42,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[{"funder":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation","award_id":"1700527"}],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W2025768430","https://openalex.org/W2112700013","https://openalex.org/W2156204309","https://openalex.org/W2535873859","https://openalex.org/W2744095836","https://openalex.org/W2753652472","https://openalex.org/W2760355118","https://openalex.org/W2768211408","https://openalex.org/W2786088545","https://openalex.org/W2787947370","https://openalex.org/W2789828921","https://openalex.org/W2798302089","https://openalex.org/W2809097945","https://openalex.org/W2811069758","https://openalex.org/W2890474333","https://openalex.org/W2910068345","https://openalex.org/W2958285686","https://openalex.org/W2963197901","https://openalex.org/W2964153729","https://openalex.org/W2964301649","https://openalex.org/W2975370684","https://openalex.org/W2988465456","https://openalex.org/W2991408690","https://openalex.org/W9657784"],"related_works":["https://openalex.org/W4386716251","https://openalex.org/W4311734044","https://openalex.org/W4205705013","https://openalex.org/W3046843850","https://openalex.org/W2752924294","https://openalex.org/W2364419519","https://openalex.org/W2363105058","https://openalex.org/W2355809385","https://openalex.org/W2141254179","https://openalex.org/W1516902003"],"abstract_inverted_index":{"The":[0],"increase":[1],"of":[2,50,114,143,147,151,177,186],"cyber":[3],"attacks":[4,115,153,179],"in":[5,11,154,193,202],"both":[6],"the":[7,34,38,51,96,106,112,141],"numbers":[8],"and":[9,197],"varieties":[10],"recent":[12],"years":[13],"demands":[14],"to":[15,53,69,95,136,191,200,207],"build":[16,137],"a":[17,45,133,155,172,175,194],"more":[18],"sophisticated":[19],"network":[20,39,116,152,178],"intrusion":[21],"detection":[22,185],"system":[23],"(NIDS).":[24],"These":[25],"NIDS":[26,58,74,87,139],"perform":[27],"better":[28],"when":[29,41],"they":[30,101],"can":[31,183],"monitor":[32],"all":[33],"traffic":[35,66,188],"traversing":[36],"through":[37],"like":[40],"being":[42,93],"deployed":[43],"on":[44,76,105,171],"Software-Defined":[46],"Network":[47],"(SDN).":[48],"Because":[49],"inability":[52],"detect":[54],"zero-day":[55],"attacks,":[56],"signature-based":[57],"which":[59,109],"were":[60,102],"traditionally":[61],"used":[62],"for":[63],"detecting":[64,148],"malicious":[65,187],"are":[67],"beginning":[68],"get":[70],"replaced":[71],"by":[72,189,198],"anomaly-based":[73],"built":[75],"neural":[77],"networks.":[78],"However,":[79],"recently":[80,209],"it":[81],"has":[82],"been":[83],"shown":[84],"that":[85],"such":[86],"have":[88],"their":[89],"own":[90],"drawback":[91],"namely":[92],"vulnerable":[94],"adversarial":[97,165,204],"example":[98,166],"attack.":[99,167],"Moreover,":[100],"mostly":[103],"evaluated":[104],"old":[107],"datasets":[108],"don't":[110],"represent":[111],"variety":[113,176],"systems":[117],"might":[118],"face":[119],"these":[120],"days.":[121],"In":[122],"this":[123],"paper,":[124],"we":[125],"present":[126],"Reconstruction":[127],"from":[128],"Partial":[129],"Observation":[130],"(RePO)":[131],"as":[132],"new":[134],"mechanism":[135],"an":[138,161,203],"with":[140,160,174],"help":[142],"denoising":[144,181],"autoencoders":[145,182],"capable":[146],"different":[149],"types":[150],"low":[156],"false":[157],"alert":[158],"setting":[159,196,205],"enhanced":[162],"robustness":[163],"against":[164],"Our":[168],"evaluation":[169],"conducted":[170],"dataset":[173],"shows":[180],"improve":[184],"up":[190,199],"29%":[192],"normal":[195],"45%":[201],"compared":[206],"other":[208],"proposed":[210],"anomaly":[211],"detectors.":[212]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3113651845","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2}],"updated_date":"2024-12-12T11:16:13.971125","created_date":"2021-01-05"}