Cited 0 time in
A DeepSHAP-based Adversarial Attack on Machine Learning-Based Network Intrusion Detection
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Chung, Byung Chang | - |
| dc.contributor.author | Han, Gyu-Bum | - |
| dc.date.accessioned | 2026-01-22T08:00:08Z | - |
| dc.date.available | 2026-01-22T08:00:08Z | - |
| dc.date.issued | 2026-01 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/82065 | - |
| dc.description.abstract | We propose an adversarial attack for machine-learning-based network intrusion detection systems that selectively alters only the most influential features. Unlike conventional attacks such as the Fast Gradient Sign Method (FGSM) and multi-step Projected Gradient Descent (PGD), which can perturb all feature dimensions, our DeepSHAP-guided masked-PGD approach focuses its updates on a small set of highly influential features while still achieving competitive success rates on the X-IIoTID dataset. Experimental results indicate that it yields lower autoencoder-based reconstruction error and uses much sparser perturbations, making its adversarial examples harder to detect. By systematically varying the perturbation budget and the number of targeted features, we show the trade-off between stealth and effectiveness. These findings demonstrate the difficulty of detecting adversarial examples guided by feature importance. | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
| dc.title | A DeepSHAP-based Adversarial Attack on Machine Learning-Based Network Intrusion Detection | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ACCESS.2025.3650123 | - |
| dc.identifier.scopusid | 2-s2.0-105026481338 | - |
| dc.identifier.bibliographicCitation | IEEE Access | - |
| dc.citation.title | IEEE Access | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | adversarial attacks | - |
| dc.subject.keywordAuthor | avoiding anomaly detection | - |
| dc.subject.keywordAuthor | DeepSHAP | - |
| dc.subject.keywordAuthor | feature importance | - |
| dc.subject.keywordAuthor | network intrusion detection systems | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0534
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
