Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A DeepSHAP-based Adversarial Attack on Machine Learning-Based Network Intrusion Detection

Full metadata record
DC Field Value Language
dc.contributor.authorChung, Byung Chang-
dc.contributor.authorHan, Gyu-Bum-
dc.date.accessioned2026-01-22T08:00:08Z-
dc.date.available2026-01-22T08:00:08Z-
dc.date.issued2026-01-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/82065-
dc.description.abstractWe propose an adversarial attack for machine-learning-based network intrusion detection systems that selectively alters only the most influential features. Unlike conventional attacks such as the Fast Gradient Sign Method (FGSM) and multi-step Projected Gradient Descent (PGD), which can perturb all feature dimensions, our DeepSHAP-guided masked-PGD approach focuses its updates on a small set of highly influential features while still achieving competitive success rates on the X-IIoTID dataset. Experimental results indicate that it yields lower autoencoder-based reconstruction error and uses much sparser perturbations, making its adversarial examples harder to detect. By systematically varying the perturbation budget and the number of targeted features, we show the trade-off between stealth and effectiveness. These findings demonstrate the difficulty of detecting adversarial examples guided by feature importance.-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleA DeepSHAP-based Adversarial Attack on Machine Learning-Based Network Intrusion Detection-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2025.3650123-
dc.identifier.scopusid2-s2.0-105026481338-
dc.identifier.bibliographicCitationIEEE Access-
dc.citation.titleIEEE Access-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthoradversarial attacks-
dc.subject.keywordAuthoravoiding anomaly detection-
dc.subject.keywordAuthorDeepSHAP-
dc.subject.keywordAuthorfeature importance-
dc.subject.keywordAuthornetwork intrusion detection systems-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Chung, Byung Chang photo

Chung, Byung Chang
IT공과대학 (AI정보공학과)
Read more

Altmetrics

Total Views & Downloads

BROWSE