Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 15 , Issue 2 , PP: 01-16, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Adversarial Machine Learning Challenges in Modern Network Security Systems

Lissett Margarita Arévalo Gamboa 1 * , Alberto León-Batallas 2 , Jhonny Ortiz-Mata 3 , Denis Mendoza-Cabrera 4

  • 1 Professor, Universidad Estatal de Milagro Facultad de Ciencias e Ingeniería Milagro, Ecuador - (Larevalog3@unemi.edu.ec)
  • 2 Professor, Universidad Estatal de Milagro Facultad de Ciencias e Ingeniería Milagro, Ecuador - (aleonb2@unemi.edu.ec)
  • 3 Professor, Universidad Estatal de Milagro Facultad de Ciencias e Ingeniería Milagro, Ecuador - (jortizm2@unemi.edu.ec)
  • 4 Professor, Universidad Estatal de Milagro Facultad de Ciencias e Ingeniería Milagro, Ecuador - (dmendozac2@unemi.edu.ec)
  • Doi: https://doi.org/10.54216/JCIM.150201

    Received: April 20, 2024 Revised: June 19, 2024 Accepted: October 02, 2024
    Abstract

    Hostile machine learning has network security issues that reduce prediction model accuracy. A full defence against these assaults entails establishing hostile scenarios, strengthening models via strategy training, and applying powerful defences. Small adjustments introduce antagonistic inputs into the research. These teach the model to recognize and withstand deception attempts. The proposed solution competed with Trust Shield, Secure Guard, Defend, and Adversary Block in rigorous performance testing. The recommended strategy has a 95.0% success rate for discovering assaults and a much lower 5.0% false positive rate. This is much superior to conventional approaches. Due to its modest accuracy loss and rapid response, it's effective at fighting assaults. This comprehensive overview demonstrates the wide-scale application of the strategy with minimal resources. Finally, this research emphasizes the need for robust and adaptable AI security. This will assist in creating secure and trustworthy AI solutions to protect sensitive data and ensure prediction model accuracy in an increasingly hostile future.

    Keywords :

    Adversarial attacks , Machine learning , Model robustness , Network security , Predictive models , Security measures , Sensitivity analysis , Threat mitigation , Training strategies , Trust management

    References

    [1] P. V. Ford and A. Siraj, “Applications of machine learning in cyber security,” in Proceedings of the 27th International Conference on Computer Applications in Industry and Engineering, New Orleans, LA, USA, 13–15 October 2014, vol. 118.

    [2] D. E. Denning, “An intrusion-detection model,” IEEE Trans. Softw. Eng., vol. 2, pp. 222–232, 1987.

    [3] H.-J. Liao, C.-H. R. Lin, Y.-C. Lin, and K.-Y. Tung, “Intrusion detection system: A comprehensive review,” J. Netw. Comput. Appl., vol. 36, pp. 16–24, 2013.

    [4] A. Aldweesh, A. Derhab, and A. Z. Emam, “Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Syst., vol. 189, p. 105124, 2020.

    [5] H. Liu and B. Lang, “Machine learning and deep learning methods for intrusion detection systems: A survey,” Appl. Sci., vol. 9, no. 4396, 2019.

    [6] D. Pathak, "Neural correlate-based E-learning validation and classification using convolutional and Long Short-Term Memory networks," Traitement du Signal, vol. 40, no. 4, pp. 1457-1467, 2023. [Online]. Available: https://doi.org/10.18280/ts.400414

    [7] R. Kashyap, "Stochastic Dilated Residual Ghost Model for Breast Cancer Detection," J Digit Imaging, vol. 36, pp. 562–573, 2023. [Online]. Available: https://doi.org/10.1007/s10278-022-00739-z

    [8] V. Khairnar, "Deep Hybrid Model with Trained Weights for Multimodal Sarcasm Detection," in Inventive Communication and Computational Technologies, G. Ranganathan, G. A. Papakostas, and Á. Rocha, Eds. Singapore: Springer, 2023, vol. 757, Lecture Notes in Networks and Systems. [Online]. Available: https://doi.org/10.1007/978-981-99-5166-6_13

    [9] A. McCarthy, E. Ghadafi, P. Andriotis, and P. Legg, “Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey,” J. Cybersecurity Priv., vol. 2, pp. 154–190, 2022.

    [10] K. Yang, J. Liu, C. Zhang, and Y. Fang, “Adversarial examples against the deep learning based network intrusion detection systems,” in Proceedings of MILCOM 2018–2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018, pp. 559–564.

    [11] E. Alhajjar, P. Maxwell, and N. Bastian, “Adversarial machine learning in Network Intrusion Detection Systems,” Expert Syst. Appl., vol. 186, p. 115782, 2021.

    [12] N. Dalvi, P. Domingos, M. Mausam, S. Sanghai, and D. Verma, “Adversarial classification,” in Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 22 August 2004, pp. 99–108.

    [13] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, “Impact of artificial ‘gummy’ fingers on fingerprint systems,” in Optical Security and Counterfeit Deterrence Techniques IV, International Society for Optics and Photonics, San Jose, CA, USA, 2002, vol. 4677, pp. 275–289.

    [14] R. Nair, M. M. Abdulhasan, H. H. Khalaf, and A. M. Shareef, "A deep learning-based model for mutation rate prediction of COVID-19 using genomic sequences," in 2023 Seventh International Conference on Image Information Processing (ICIIP), Solan, India, 2023, pp. 759-764. doi: 10.1109/ICIIP61524.2023.10537657.

    [15] S. Dubey et al., "Why Big Data and Data Analytics for Smart City," in 2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI), Gwalior, India, 2023, pp. 1-5. doi: 10.1109/CVMI59935.2023.10464613.

    [16] M. A. Ayub, W. A. Johnson, D. A. Talbert, and A. Siraj, “Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning,” in Proceedings of the 2020 54th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 18–20 March 2020.

    [17] P. M. Shafi, "Artificial Driving based EfficientNet for Automatic Plant Leaf Disease Classification," Multimed Tools Appl, 2023. [Online]. Available: https://doi.org/10.1007/s11042-023-16882-w

    [18] R. Kashyap, "Machine Learning, Data Mining for IoT-Based Systems," in Research Anthology on Machine Learning Techniques, Methods, and Applications, Information Resources Management Association, Ed. IGI Global, 2022, pp. 447-471. [Online]. Available: https://doi.org/10.4018/978-1-6684-6291-1.ch025

    [19] N. Akhtar and A. Mian, “Threat of adversarial attacks on deep learning in computer vision: A survey,” IEEE Access, vol. 6, pp. 14410–14430, 2018.

    [20] A. Sharma et al., "Rose plant disease detection using image processing and machine learning," in International Conference on Applied Technologies. ICAT 2023. Communications in Computer and Information Science, vol. 2050, M. Botto-Tobar, M. Zambrano Vizuete, S. Montes León, P. Torres-Carrión, and B. Durakovic, Eds. Cham: Springer, 2024. doi: 10.1007/978-3-031-58953-9_6.

    [21] R. Nair, A. A. Fadhil, M. M. Hamed, and A. H. O. Al Mansor, "Spine surgery uses of artificial learning and machine learning: A LDH treatment," in 2023 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), Mangalore, India, 2023, pp. 238-243. doi: 10.1109/DISCOVER58830.2023.10316719.

    [22] Y. Zhou, M. Kantarcioglu, and B. Xi, “A survey of game theoretic approach for adversarial machine learning,” Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 9, no. e1259, 2019.

    [23] B. Dasgupta and J. Collins, “A survey of game theory methods for adversarial machine learning in cybersecurity tasks,” Amnesty Int. J., vol. 40, pp. 31–43, 2019.

    [24] V. Duddu, “A survey of adversarial machine learning in cyber warfare,” Def. Sci. J., vol. 68, pp. 356, 2018.

    [25] H. P. Sahu, "FINE_DENSEIGANET: Automatic medical image classification in chest CT scan using Hybrid Deep Learning Framework," International Journal of Image and Graphics [Preprint], 2023. [Online]. Available: https://doi.org/10.1142/s0219467825500044

    [26] I. Homoliak, M. Teknos, M. Ochoa, D. Breitenbacher, S. Hosseini, and P. Hanacek, “Improving network intrusion detection classifiers by non-payload-based exploit-independent obfuscations: An adversarial approach,” arXiv, 2018, arXiv:1805.02684.

    Cite This Article As :
    Margarita, Lissett. , León-Batallas, Alberto. , Ortiz-Mata, Jhonny. , Mendoza-Cabrera, Denis. Adversarial Machine Learning Challenges in Modern Network Security Systems. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 01-16. DOI: https://doi.org/10.54216/JCIM.150201
    Margarita, L. León-Batallas, A. Ortiz-Mata, J. Mendoza-Cabrera, D. (2025). Adversarial Machine Learning Challenges in Modern Network Security Systems. Journal of Cybersecurity and Information Management, (), 01-16. DOI: https://doi.org/10.54216/JCIM.150201
    Margarita, Lissett. León-Batallas, Alberto. Ortiz-Mata, Jhonny. Mendoza-Cabrera, Denis. Adversarial Machine Learning Challenges in Modern Network Security Systems. Journal of Cybersecurity and Information Management , no. (2025): 01-16. DOI: https://doi.org/10.54216/JCIM.150201
    Margarita, L. , León-Batallas, A. , Ortiz-Mata, J. , Mendoza-Cabrera, D. (2025) . Adversarial Machine Learning Challenges in Modern Network Security Systems. Journal of Cybersecurity and Information Management , () , 01-16 . DOI: https://doi.org/10.54216/JCIM.150201
    Margarita L. , León-Batallas A. , Ortiz-Mata J. , Mendoza-Cabrera D. [2025]. Adversarial Machine Learning Challenges in Modern Network Security Systems. Journal of Cybersecurity and Information Management. (): 01-16. DOI: https://doi.org/10.54216/JCIM.150201
    Margarita, L. León-Batallas, A. Ortiz-Mata, J. Mendoza-Cabrera, D. "Adversarial Machine Learning Challenges in Modern Network Security Systems," Journal of Cybersecurity and Information Management, vol. , no. , pp. 01-16, 2025. DOI: https://doi.org/10.54216/JCIM.150201