Musthafa International Journal of Advanced Engineering, Management and Science, 11(5) -2025
This article can be downloaded from here: www.ijaems.com 82
©2025 The Author(s). Published by Infogain Publication, This work is licensed under a Creative Commons Attribution 4.0
License. http://creativecommons.org/licenses/by/4.0/
REFERENCES
[1] Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015).
Explaining and harnessing adversarial examples. arXiv
preprint arXiv:1412.6572.
[2] Grosse, K., Papernot, N., Manoharan, P., Backes, M., &
McDaniel, P. (2017). Adversarial examples for malware
detection. In European Symposium on Research in
Computer Security (pp. 62–79). Springer.
[3] Huang, S., Wang, C., & Lin, J. (2019). Adversarial attacks
on deep-learning based network intrusion detection systems.
IEEE Access, 7, 84862–84871.
[4] Carlini, N., & Wagner, D. (2017). Towards evaluating the
robustness of neural networks. In 2017 IEEE Symposium
on Security and Privacy (SP), pp. 39–57.
[5] Xu, W., Evans, D., & Qi, Y. (2017). Feature squeezing:
Detecting adversarial examples in deep neural networks.
arXiv preprint arXiv:1704.01155.
[6] Canadian Institute for Cybersecurity. (2017). CIC-
IDS2017 Dataset . Retrieved from
https://www.unb.ca/cic/datasets/ids-2017.html
[7] Moustafa, N., & Slay, J. (2015). UNSW-NB15: A
comprehensive data set for network intrusion detection
systems (UNSW-NB15 network data set). In 2015 Military
Communications and Information Systems Conference
(MilCIS) (pp. 1–6). IEEE.
[8] Madry, A., Makelov, A., Schmidt, L., Tsipras, D., &
Vladu, A. (2018). Towards deep learning models resistant to
adversarial attacks. arXiv preprint arXiv:1706.06083.
[9] Papernot, N., McDaniel, P., Jha, S., Fredrikson, M.,
Celik, Z. B., & Swami, A. (2016). The limitations of deep
learning in adversarial settings. In 2016 IEEE European
Symposium on Security and Privacy (EuroS&P), pp.
372–387.
[10] Zhang, C., Wang, X., & Zhang, Z. (2020). Adversarial
training for robust intrusion detection in industrial control
systems. IEEE Access, 8, 108383–108394.
[11] Doshi, R., Apthorpe, N., & Feamster, N. (2018). Machine
learning DDoS detection for consumer internet of things
devices. In 2018 IEEE Security and Privacy Workshops
(SPW), pp. 29–35.
[12] Raff, E., Zak, R., Cox, R., Sylvester, J., McLean, M., &
Nicholas, C. (2018). An investigation of adversarial
examples in malware detection. In Proceedings of the 18th
IEEE International Conference on Machine Learning
and Applications (ICMLA)”, pp. 279–284.
[13] Vitorino, A. S., Silva, L. C., & Ferreira, A. (2022).
Adaptive perturbation patterns: Realistic adversarial
learning for robust intrusion detection. arXiv preprint
arXiv:2203.04234. https://arxiv.org/abs/2203.04234
[14] Roshan, N., Zafar, K., & Haque, R. (2023). A novel deep
learning based model to defend network intrusion
detection systems against adversarial attacks. arXiv
preprint arXiv:2308.00077.
https://arxiv.org/abs/2308.00077