Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/106148
DC FieldValueLanguage
dc.contributor.authorMartins, Nuno-
dc.contributor.authorCruz, Jose Magalhaes-
dc.contributor.authorCruz, Tiago-
dc.contributor.authorAbreu, Pedro Henriques-
dc.date.accessioned2023-03-22T12:07:33Z-
dc.date.available2023-03-22T12:07:33Z-
dc.date.issued2020-
dc.identifier.issn2169-3536pt
dc.identifier.urihttps://hdl.handle.net/10316/106148-
dc.description.abstractCyber-security is the practice of protecting computing systems and networks from digital attacks, which are a rising concern in the Information Age. With the growing pace at which new attacks are developed, conventional signature based attack detection methods are often not enough, and machine learning poses as a potential solution. Adversarial machine learning is a research area that examines both the generation and detection of adversarial examples, which are inputs specially crafted to deceive classi ers, and has been extensively studied speci cally in the area of image recognition, where minor modi cations are performed on images that cause a classi er to produce incorrect predictions. However, in other elds, such as intrusion and malware detection, the exploration of such methods is still growing. The aim of this survey is to explore works that apply adversarial machine learning concepts to intrusion and malware detection scenarios. We concluded that a wide variety of attacks were tested and proven effective in malware and intrusion detection, although their practicality was not tested in intrusion scenarios. Adversarial defenses were substantially less explored, although their effectiveness was also proven at resisting adversarial attacks. We also concluded that, contrarily to malware scenarios, the variety of datasets in intrusion scenarios is still very small, with the most used dataset being greatly outdated.pt
dc.language.isoengpt
dc.publisherIEEEpt
dc.rightsopenAccesspt
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt
dc.subjectCybersecuritypt
dc.subjectadversarial machine learningpt
dc.subjectintrusion detectionpt
dc.subjectmalware detectionpt
dc.titleAdversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Reviewpt
dc.typearticle-
degois.publication.firstPage35403pt
degois.publication.lastPage35419pt
degois.publication.titleIEEE Accesspt
dc.peerreviewedyespt
dc.identifier.doi10.1109/ACCESS.2020.2974752pt
degois.publication.volume8pt
dc.date.embargo2020-01-01*
uc.date.periodoEmbargo0pt
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextopen-
item.fulltextCom Texto completo-
item.cerifentitytypePublications-
item.openairetypearticle-
crisitem.author.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.author.parentresearchunitFaculty of Sciences and Technology-
crisitem.author.orcid0000-0001-9278-6503-
crisitem.author.orcid0000-0002-9278-8194-
Appears in Collections:FCTUC Eng.Informática - Artigos em Revistas Internacionais
Show simple item record

SCOPUSTM   
Citations

141
checked on Aug 12, 2024

WEB OF SCIENCETM
Citations

87
checked on Aug 2, 2024

Page view(s)

89
checked on Aug 13, 2024

Download(s)

98
checked on Aug 13, 2024

Google ScholarTM

Check

Altmetric

Altmetric


This item is licensed under a Creative Commons License Creative Commons