Recognition: no theorem link
Uncovering and Understanding FPR Manipulation Attack in Industrial IoT Networks
Pith reviewed 2026-05-16 12:07 UTC · model grok-4.3
The pith
Benign IoT traffic can be turned into attacks for NIDS through simple MQTT-based packet perturbations with 80-100% success.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper uncovers the FPR manipulation attack (FPA) that specifically targets industrial IoT networks by exploiting domain knowledge of the MQTT protocol to perform systematic simple packet-level perturbations on benign traffic samples. These perturbations alter the labels assigned by NIDS models from benign to attack without using traditional gradient-based or non-gradient-based adversarial methods, achieving success rates between 80.19% and 100%. The work further demonstrates the impact on Security Operations Centers where small numbers of such false positives can delay genuine alert investigations by up to 2 hours daily, and uses statistical and explainable AI analyses to identify key 2-
What carries the argument
The FPR manipulation attack (FPA) using MQTT protocol domain knowledge for simple packet-level perturbations to flip benign traffic labels in NIDS models.
If this is right
- Even a small fraction of false positive alerts from FPA can increase the delay of genuine alert investigations by up to 2 hours in a single day.
- FPA packets can enhance NIDS model robustness when used in adversarial training.
- Decision boundaries in the models shift when trained with FPA packets.
- Statistical and XAI analyses identify key factors driving the high success rate of the attack.
Where Pith is reading between the lines
- This type of attack could potentially be adapted to other common IoT communication protocols besides MQTT.
- Monitoring traffic for specific MQTT packet perturbation patterns might serve as an early detection method for such manipulations.
- Testing the attack against a wider variety of NIDS architectures would clarify its generality in real industrial settings.
Load-bearing premise
The assumption that simple non-gradient MQTT-based packet perturbations can reliably flip the labels of benign traffic in real-world deployed NIDS models under industrial IoT conditions.
What would settle it
Running the perturbed packets through the NIDS models on independent industrial IoT datasets and checking if the misclassification success rate falls significantly below 80% or if the perturbations are flagged as anomalous by the system itself.
Figures
read the original abstract
In the network security domain, due to practical issues -- including imbalanced data and heterogeneous legitimate network traffic -- adversarial attacks in machine learning-based NIDSs have been viewed as attack packets misclassified as benign. Due to this prevailing belief, the possibility of (maliciously) perturbed benign packets being misclassified as attack has been largely ignored. In this paper, we demonstrate that this is not only theoretically possible, but also a particular threat to NIDS. In particular, we uncover a practical cyberattack, FPR manipulation attack (FPA), especially targeting industrial IoT networks, where domain-specific knowledge of the widely used MQTT protocol is exploited and a systematic simple packet-level perturbation is performed to alter the labels of benign traffic samples without employing traditional gradient-based or non-gradient-based methods. The experimental evaluations demonstrate that this novel attack results in a success rate of 80.19% to 100%. In addition, while estimating impacts in the Security Operations Center, we observe that even a small fraction of false positive alerts, irrespective of different budget constraints and alert traffic intensities, can increase the delay of genuine alerts investigations up to 2 hr in a single day under normal operating conditions. Furthermore, a series of relevant statistical and XAI analyses is conducted to understand the key factors behind this remarkable success. Finally, we explore the effectiveness of the FPA packets to enhance models' robustness through adversarial training and investigate the changes in decision boundaries accordingly.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper claims to introduce the FPR Manipulation Attack (FPA), a practical cyberattack on machine learning-based NIDS in industrial IoT networks. It exploits domain knowledge of the MQTT protocol to apply simple, non-gradient packet-level perturbations to benign traffic samples, flipping their labels to attack without traditional adversarial methods. Experimental results report success rates of 80.19% to 100%, with additional analysis of SOC impacts (e.g., up to 2-hour delays in genuine alert investigations), statistical/XAI explanations of success factors, and evaluation of the perturbations for improving model robustness via adversarial training.
Significance. If the central experimental claims hold under scrutiny, the work would be significant for highlighting an under-explored attack vector in NIDS: manipulation of false positive rates via benign traffic perturbations rather than the conventional focus on misclassifying attacks as benign. The MQTT-specific, non-gradient approach offers a low-complexity threat model relevant to resource-constrained IoT deployments, and the SOC delay analysis provides a concrete operational impact metric. The robustness experiments could inform practical defenses if the perturbations prove stealthy.
major comments (3)
- [Experimental evaluations] Experimental evaluations section: The abstract and results report success rates of 80.19%–100% but provide no details on the specific NIDS models, datasets, exact MQTT packet perturbation parameters, statistical tests, or error bars. This leaves the central claim of reliable label flipping unverifiable and undermines reproducibility.
- [Experimental evaluations] Stealthiness and practicality assessment: The experiments measure only label-flip success on the target classifier but report no anomaly scores, feature distances, or evaluations against secondary detectors to confirm that perturbed packets reach the NIDS without being filtered. Without this, the high success rates may not translate to practical threats in deployed SOC pipelines.
- [SOC impact estimation] SOC impact analysis: The claim of up to 2-hour delays in genuine alert investigations from small fractions of false positives is presented without specifying the underlying alert traffic model, budget constraints, or simulation parameters, making it difficult to assess the quantitative validity of the operational impact.
minor comments (2)
- [Abstract] The abstract could include a short statement on the datasets or NIDS architectures used to give readers immediate context for the reported success rates.
- [Introduction] Notation for FPA and MQTT fields should be defined consistently on first use to improve readability for readers unfamiliar with industrial IoT protocols.
Simulated Author's Rebuttal
We thank the referee for the constructive comments, which help improve the clarity and reproducibility of our work. We address each major comment below and will revise the manuscript to incorporate additional details where needed.
read point-by-point responses
-
Referee: Experimental evaluations section: The abstract and results report success rates of 80.19%–100% but provide no details on the specific NIDS models, datasets, exact MQTT packet perturbation parameters, statistical tests, or error bars. This leaves the central claim of reliable label flipping unverifiable and undermines reproducibility.
Authors: We agree that additional specifics are required for full reproducibility. In the revised manuscript, we will expand the Experimental Evaluations section to explicitly list the NIDS models (including their architectures and hyperparameters), the datasets used, the precise MQTT packet perturbation parameters (e.g., targeted fields and modification rules), and report results with statistical tests (e.g., t-tests) and error bars from repeated trials. revision: yes
-
Referee: Stealthiness and practicality assessment: The experiments measure only label-flip success on the target classifier but report no anomaly scores, feature distances, or evaluations against secondary detectors to confirm that perturbed packets reach the NIDS without being filtered. Without this, the high success rates may not translate to practical threats in deployed SOC pipelines.
Authors: We acknowledge the importance of demonstrating that perturbed packets remain stealthy in realistic pipelines. The revised version will include new analyses reporting anomaly scores from the primary NIDS, feature-space distances (e.g., Euclidean or Manhattan), and evaluations against secondary detectors or rule-based filters to confirm the perturbations can reach the classifier without being dropped. revision: yes
-
Referee: SOC impact analysis: The claim of up to 2-hour delays in genuine alert investigations from small fractions of false positives is presented without specifying the underlying alert traffic model, budget constraints, or simulation parameters, making it difficult to assess the quantitative validity of the operational impact.
Authors: We will revise the SOC impact section to fully specify the underlying model (e.g., queuing theory assumptions and arrival process), budget constraints (e.g., analyst capacity), and simulation parameters (e.g., number of Monte Carlo runs, traffic intensity values). This will allow readers to reproduce and evaluate the reported delay figures. revision: yes
Circularity Check
No circularity: attack success is measured experimentally, not derived by construction
full rationale
The paper presents an experimental demonstration of the FPA attack on industrial IoT NIDS models using MQTT packet perturbations. Success rates (80.19%–100%) are reported as direct evaluation outcomes on traffic samples rather than quantities obtained by fitting parameters to a subset of data and then predicting related values, or by any self-referential definition. No equations, ansatzes, or uniqueness theorems are invoked in the provided text that reduce the central claim to its own inputs. The work is self-contained as an empirical attack study; the reported impacts on SOC alert delays are likewise observational. No load-bearing self-citations or renamings of known results appear in the derivation chain.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Machine learning-based NIDS suffer from practical issues including imbalanced data and heterogeneous legitimate traffic that enable label alteration via simple perturbations
Reference graph
Works this paper leans on
-
[1]
Adversarial attacks against supervised machine learning based network intrusion detection systems,
E. Alshahrani, D. Alghazzawi, R. Alotaibi, and O. Rabie, “Adversarial attacks against supervised machine learning based network intrusion detection systems,”Plos one, vol. 17, no. 10, p. e0275971, 2022
work page 2022
-
[2]
W. Yao, H. Peng, Q. Li, and X. Shen, “Modeling realistic adversarial traffic against deep learning-based intrusion detection system in indus- trial IoT,”IEEE Internet of Things Journal, 2025
work page 2025
-
[3]
Idsgan: Generative adversarial networks for attack generation against intrusion detection,
Z. Lin, Y. Shi, and Z. Xue, “Idsgan: Generative adversarial networks for attack generation against intrusion detection,” inPacific-asia conference on knowledge discovery and data mining. Springer, 2022, pp. 79–91
work page 2022
-
[4]
Adversarial examples for network intrusion detection systems,
R. Sheatsley, N. Papernot, M. J. Weisman, G. Verma, and P. McDaniel, “Adversarial examples for network intrusion detection systems,”Journal of Computer Security, vol. 30, no. 5, pp. 727–752, 2022
work page 2022
-
[5]
Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks,
O. Ibitoye, O. Shafiq, and A. Matrawy, “Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks,” in2019 IEEE global communications conference (GLOBECOM). IEEE, 2019, pp. 1–6
work page 2019
-
[6]
C. Zhang, X. Costa-Perez, and P. Patras, “Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms,”IEEE/ACM Transactions on Networking, vol. 30, no. 3, pp. 1294–1311, 2022
work page 2022
-
[7]
TANTRA: Timing-based adversarial network traffic reshaping attack,
Y. Sharon, D. Berend, Y. Liu, A. Shabtai, and Y. Elovici, “TANTRA: Timing-based adversarial network traffic reshaping attack,”IEEE Trans- actions on Information Forensics and Security, vol. 17, pp. 3225–3237, 2022
work page 2022
-
[8]
Towards evaluation of NIDSs in adversarial setting,
M. J. Hashemi, G. Cusack, and E. Keller, “Towards evaluation of NIDSs in adversarial setting,” inProceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks, 2019, pp. 14–21
work page 2019
-
[9]
Automatic evasion of machine learning-based network intrusion detec- tion systems,
H. Yan, X. Li, W. Zhang, R. Wang, H. Li, X. Zhao, F. Li, and X. Lin, “Automatic evasion of machine learning-based network intrusion detec- tion systems,”IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 1, pp. 153–167, 2023
work page 2023
-
[10]
Snort: Lightweight intrusion detection for networks
M. Roeschet al., “Snort: Lightweight intrusion detection for networks.” inLisa, vol. 99, no. 1, 1999, pp. 229–238
work page 1999
-
[11]
Bro: a system for detecting network intruders in real-time,
V. Paxson, “Bro: a system for detecting network intruders in real-time,” Computer networks, vol. 31, no. 23-24, pp. 2435–2463, 1999
work page 1999
-
[12]
Effect of imbalanced datasets on security of industrial IoT using machine learning,
M. Zolanvari, M. A. Teixeira, and R. Jain, “Effect of imbalanced datasets on security of industrial IoT using machine learning,” in2018 IEEE international conference on intelligence and security informatics (ISI). IEEE, 2018, pp. 112–117
work page 2018
-
[13]
M. S. Ahsan, S. Islam, and S. Shatabda, “A systematic review of metaheuristics-based and machine learning-driven intrusion detection systems in IoT,”Swarm and Evolutionary Computation, vol. 96, p. 101984, 2025
work page 2025
-
[14]
Adversarial machine learning for network intrusion detection systems: A comprehensive survey,
K. He, D. D. Kim, and M. R. Asghar, “Adversarial machine learning for network intrusion detection systems: A comprehensive survey,”IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 538–566, 2023
work page 2023
-
[15]
M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, “Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning,”IEEE Access, vol. 10, pp. 40 281–40 306, 2022
work page 2022
-
[16]
De- tecting brittle decisions for free: Leveraging margin consistency in deep robust classifiers,
J. Ngnaw ´e, S. Sahoo, Y. Pequignot, F. Precioso, and C. Gagn ´e, “De- tecting brittle decisions for free: Leveraging margin consistency in deep robust classifiers,”Advances in Neural Information Processing Systems, vol. 37, pp. 23 301–23 324, 2024
work page 2024
-
[17]
Boundary thickness and robust- ness in learning models,
Y. Yang, R. Khanna, Y. Yu, A. Gholami, K. Keutzer, J. E. Gonzalez, K. Ramchandran, and M. W. Mahoney, “Boundary thickness and robust- ness in learning models,”Advances in Neural Information Processing Systems, vol. 33, pp. 6223–6234, 2020
work page 2020
-
[18]
On the Geometry of Adversarial Examples
M. Khoury and D. Hadfield-Menell, “On the geometry of adversarial examples,”arXiv preprint arXiv:1811.00525, 2018
work page internal anchor Pith review Pith/arXiv arXiv 2018
-
[19]
Exploring and exploiting decision boundary dynamics for adversarial robustness,
Y. Xu, Y. Sun, M. Goldblum, T. Goldstein, and F. Huang, “Exploring and exploiting decision boundary dynamics for adversarial robustness,” arXiv preprint arXiv:2302.03015, 2023
-
[20]
Explaining and Harnessing Adversarial Examples
I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,”arXiv preprint arXiv:1412.6572, 2014
work page internal anchor Pith review Pith/arXiv arXiv 2014
-
[21]
Towards Deep Learning Models Resistant to Adversarial Attacks
A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, “Towards deep learning models resistant to adversarial attacks,”arXiv preprint arXiv:1706.06083, 2017
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[22]
The limitations of deep learning in adversarial settings,
N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, “The limitations of deep learning in adversarial settings,” in 2016 IEEE European symposium on security and privacy (EuroS&P). IEEE, 2016, pp. 372–387
work page 2016
-
[23]
P.-Y. Chen, H. Zhang, Y. Sharma, J. Yi, and C.-J. Hsieh, “ZOO: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models,” inProceedings of the 10th ACM workshop on artificial intelligence and security, 2017, pp. 15–26
work page 2017
-
[24]
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models
W. Brendel, J. Rauber, and M. Bethge, “Decision-based adversarial attacks: Reliable attacks against black-box machine learning models,” arXiv preprint arXiv:1712.04248, 2017
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[25]
Generating Natural Adversarial Examples
Z. Zhao, D. Dua, and S. Singh, “Generating natural adversarial exam- ples,”arXiv preprint arXiv:1710.11342, 2017
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[26]
O. Standard, “MQTT version 3.1.1,”http://docs. oasis-open. org/mqt- t/mqtt/v3, vol. 1, p. 29, 2014
work page 2014
-
[27]
Access control enforcement within MQTT- based Internet of Things ecosystems,
P. Colombo and E. Ferrari, “Access control enforcement within MQTT- based Internet of Things ecosystems,” inProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018, pp. 223–234
work page 2018
-
[28]
Authorization – MQTT security fundamentals,
HiveMQ Team, “Authorization – MQTT security fundamentals,” HiveMQ, 2024, [Online]. Available: https://www.hivemq.com/blog/mqtt- security-fundamentals-authorization/
work page 2024
-
[29]
Eclipse Mosquitto, “mosquitto.conf man page,” https://mosquitto.org/man/mosquitto-conf-5.html, [Online]
-
[30]
Privacy-enhanced MQTT pro- tocol for massive iot,
A. Hue, G. Sharma, and J.-M. Dricot, “Privacy-enhanced MQTT pro- tocol for massive iot,”Electronics, vol. 11, no. 1, p. 70, 2021
work page 2021
-
[31]
On the use of open-source firewalls in IC- S/SCADA systems,
J. Nivethan and M. Papa, “On the use of open-source firewalls in IC- S/SCADA systems,”Information Security Journal: A Global Perspective, vol. 25, no. 1-3, pp. 83–93, 2016
work page 2016
-
[32]
Performance implications of packet filtering with Linux eBPF,
D. Scholz, D. Raumer, P. Emmerich, A. Kurtz, K. Lesiak, and G. Carle, “Performance implications of packet filtering with Linux eBPF,” in2018 30th International Teletraffic Congress (ITC 30), vol. 1. IEEE, 2018, pp. 209–217
work page 2018
-
[33]
O. N. Nyasore, P. Zavarsky, B. Swar, R. Naiyeju, and S. Dabra, “Deep packet inspection in industrial automation control system to mitigate attacks exploiting Modbus/TCP vulnerabilities,” in2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Confere...
work page 2020
-
[34]
A survey on deep packet inspection,
R. T. El-Maghraby, N. M. Abd Elazim, and A. M. Bahaa-Eldin, “A survey on deep packet inspection,” in2017 12th International Confer- ence on Computer Engineering and Systems (ICCES). IEEE, 2017, pp. 188–197
work page 2017
-
[35]
S. Lakshminarayana, A. Praseed, and P. S. Thilagam, “Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects,”IEEE Communications Surveys & Tutorials, 2024
work page 2024
-
[36]
The role of machine learning in cybersecurity,
G. Apruzzese, P. Laskov, E. Montes de Oca, W. Mallouli, L. Brdalo Rapa, A. V. Grammatopoulos, and F. Di Franco, “The role of machine learning in cybersecurity,”Digital Threats: Research and Practice, vol. 4, no. 1, pp. 1–38, 2023
work page 2023
-
[37]
Survey on categorical data for neural networks,
J. T. Hancock and T. M. Khoshgoftaar, “Survey on categorical data for neural networks,”Journal of big data, vol. 7, no. 1, p. 28, 2020
work page 2020
-
[38]
Team,MQTT Essentials: A Lightweight IoT Proto- col
H. Team,MQTT Essentials: A Lightweight IoT Proto- col. HiveMQ, n.d., ch. 4, p. 15, [Online]. Available: https://akhileshmoghe.github.io/assets/docs/iot/protocols/mqtt/hivemq- ebook-mqtt-essentials.pdf
-
[39]
An analysis of TCP maximum segment sizes,
S. Alcock and R. Nelson, “An analysis of TCP maximum segment sizes,” 2010. 14
work page 2010
-
[40]
TCP MSS values – what’s changed?
G. Huston, “TCP MSS values – what’s changed?” APNIC Blog, Jul 2019, [Online]. Available: https://blog.apnic.net/2019/07/31/tcp-mss- values-whats-changed/
work page 2019
-
[41]
Transmission Control Protocol,
J. Postel, “Transmission Control Protocol,” IETF, RFC 793, Sep. 1981, section 3.1. [Online]. Available: https://www.rfc-editor.org/info/rfc793
work page 1981
-
[42]
A survey of data mining and machine learning methods for cyber security intrusion detection,
A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,”IEEE Commu- nications surveys & tutorials, vol. 18, no. 2, pp. 1153–1176, 2015
work page 2015
-
[43]
A detailed analysis of the KDD CUP 99 data set,
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, 2009, pp. 1–6
work page 2009
-
[44]
N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in2015 military communications and information systems conference (MilCIS). IEEE, 2015, pp. 1–6
work page 2015
-
[45]
N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset,”Future Generation Computer Systems, vol. 100, pp. 779–796, 2019
work page 2019
-
[46]
Toward generating a new intrusion detection dataset and intrusion traffic characterization
I. Sharafaldin, A. H. Lashkari, A. A. Ghorbaniet al., “Toward generating a new intrusion detection dataset and intrusion traffic characterization.” ICISSp, vol. 1, pp. 108–116, 2018
work page 2018
-
[47]
N. Moustafa, “A new distributed architecture for evaluating AI-based security systems at the edge: Network TON IoT datasets,”Sustainable Cities and Society, vol. 72, p. 102994, 2021
work page 2021
-
[48]
N-BaIoT—network-based detection of IoT botnet attacks using deep autoencoders,
Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Bre- itenbacher, and Y. Elovici, “N-BaIoT—network-based detection of IoT botnet attacks using deep autoencoders,”IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, 2018
work page 2018
-
[49]
DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system,
V. Hnamte and J. Hussain, “DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system,”Telematics and Informatics Reports, vol. 10, p. 100053, 2023
work page 2023
-
[50]
Next–generation intrusion detection for IoT EVCS: Integrating CNN, LSTM, and GRU models,
D. Kilichev, D. Turimov, and W. Kim, “Next–generation intrusion detection for IoT EVCS: Integrating CNN, LSTM, and GRU models,” Mathematics, vol. 12, no. 4, p. 571, 2024
work page 2024
-
[51]
F. Imani, M. Kargar, A. Assadzadeh, and A. Bayani, “Integrating CNN- LSTM networks with statistical filtering techniques for intelligent IoT intrusion detection,” in2024 8th International Conference on Smart Cities, Internet of Things and Applications (SCIoT). IEEE, 2024, pp. 189–195
work page 2024
-
[52]
A hybrid CNN-LSTM model for IIoT edge privacy-aware intrusion detection,
E. M. de Elias, V. S. Carriel, G. W. De Oliveira, A. L. Dos Santos, M. Nogueira, R. H. Junior, and D. M. Batista, “A hybrid CNN-LSTM model for IIoT edge privacy-aware intrusion detection,” in2022 IEEE Latin-American Conference on Communications (LATINCOM). IEEE, 2022, pp. 1–6
work page 2022
-
[53]
A Baseline for Detecting Misclassified and Out-of-Distribution Examples in Neural Networks
D. Hendrycks and K. Gimpel, “A baseline for detecting misclassified and out-of-distribution examples in neural networks,”arXiv preprint arXiv:1610.02136, 2016
work page internal anchor Pith review Pith/arXiv arXiv 2016
-
[54]
Understanding softmax confidence and uncertainty,
T. Pearce, A. Brintrup, and J. Zhu, “Understanding softmax confidence and uncertainty,” 2021
work page 2021
-
[55]
Open MQTT Benchmarking Comparison: Mosquitto vs NanoMQ,
May Jin, “Open MQTT Benchmarking Comparison: Mosquitto vs NanoMQ,” https://www.emqx.com/en/blog/open-mqtt-benchmarking- comparison-mosquitto-vs-nanomq, [Online]
-
[56]
Understanding tradeoffs between throughput, quality, and cost of alert analysis in a csoc,
A. Shah, R. Ganesan, S. Jajodia, and H. Cam, “Understanding tradeoffs between throughput, quality, and cost of alert analysis in a csoc,”IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1155–1170, 2018
work page 2018
-
[57]
A methodology to measure and monitor level of operational effectiveness of a csoc,
——, “A methodology to measure and monitor level of operational effectiveness of a csoc,”International Journal of Information Security, vol. 17, no. 2, pp. 121–134, 2018
work page 2018
-
[58]
L. Yang, Z. Chen, C. Wang, Z. Zhang, S. Booma, P. Cao, C. Adam, A. Withers, Z. Kalbarczyk, R. K. Iyeret al., “True attacks, attack attempts, or benign triggers? an empirical measurement of network alerts in a security operations center,” in33rd USENIX Security Symposium (USENIX Security 24), 2024, pp. 1525–1542
work page 2024
-
[59]
A survey of distance and similarity measures used within network intrusion anomaly detection,
D. J. Weller-Fahy, B. J. Borghetti, and A. A. Sodemann, “A survey of distance and similarity measures used within network intrusion anomaly detection,”IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 70–91, 2014
work page 2014
-
[60]
A PCA-based method for IoT network traffic anomaly detection,
D. H. Hoang and H. D. Nguyen, “A PCA-based method for IoT network traffic anomaly detection,” in2018 20th International conference on advanced communication technology (ICACT). IEEE, 2018, pp. 381– 386
work page 2018
-
[61]
G. J. McLachlan, “Mahalanobis distance,”Resonance, vol. 4, no. 6, pp. 20–26, 1999
work page 1999
-
[62]
A simple unified framework for detecting out-of-distribution samples and adversarial attacks,
K. Lee, K. Lee, H. Lee, and J. Shin, “A simple unified framework for detecting out-of-distribution samples and adversarial attacks,”Advances in neural information processing systems, vol. 31, 2018
work page 2018
-
[63]
Learning a mahalanobis distance metric for data clustering and classification,
S. Xiang, F. Nie, and C. Zhang, “Learning a mahalanobis distance metric for data clustering and classification,”Pattern recognition, vol. 41, no. 12, pp. 3600–3612, 2008
work page 2008
-
[64]
I. Goodfellow, Y. Bengio, and A. Courville,Deep Learning. MIT Press, 2016, pp. 71–77. [Online]. Available: http://www.deeplearningbook.org
work page 2016
-
[65]
L. v. d. Maaten and G. Hinton, “Visualizing data using t-SNE,”Journal of machine learning research, vol. 9, no. Nov, pp. 2579–2605, 2008
work page 2008
-
[66]
UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction
L. McInnes, J. Healy, and J. Melville, “UMAP: Uniform manifold approximation and projection for dimension reduction,”arXiv preprint arXiv:1802.03426, 2018
work page internal anchor Pith review Pith/arXiv arXiv 2018
-
[67]
A unified approach to interpreting model predictions,
S. M. Lundberg and S.-I. Lee, “A unified approach to interpreting model predictions,”Advances in neural information processing systems, vol. 30, 2017
work page 2017
-
[68]
Defending network intrusion detection systems against adversarial evasion attacks,
M. Pawlicki, M. Chora ´s, and R. Kozik, “Defending network intrusion detection systems against adversarial evasion attacks,”Future Generation Computer Systems, vol. 110, pp. 148–154, 2020
work page 2020
-
[69]
M. Usama, M. Asim, S. Latif, J. Qadiret al., “Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems,” in2019 15th international wireless com- munications & mobile computing conference (IWCMC). IEEE, 2019, pp. 78–83
work page 2019
-
[70]
Adversarial training for free!
A. Shafahi, M. Najibi, M. A. Ghiasi, Z. Xu, J. Dickerson, C. Studer, L. S. Davis, G. Taylor, and T. Goldstein, “Adversarial training for free!” Advances in neural information processing systems, vol. 32, 2019
work page 2019
-
[71]
Fast is better than free: Revisiting adversarial training,
E. Wong, L. Rice, and J. Z. Kolter, “Fast is better than free: Revisiting adversarial training,”arXiv preprint arXiv:2001.03994, 2020
-
[72]
Principal component analysis: a review and recent developments,
I. T. Jolliffe and J. Cadima, “Principal component analysis: a review and recent developments,”Philosophical transactions of the royal society A: Mathematical, Physical and Engineering Sciences, vol. 374, no. 2065, p. 20150202, 2016
work page 2065
-
[73]
Robust- ness may be at odds with accuracy,
D. Tsipras, S. Santurkar, L. Engstrom, A. Turner, and A. Madry, “Robust- ness may be at odds with accuracy,”arXiv preprint arXiv:1805.12152, 2018
-
[74]
Recent advances in adversarial training for adversarial robustness,
T. Bai, J. Luo, J. Zhao, B. Wen, and Q. Wang, “Recent advances in adversarial training for adversarial robustness,”arXiv preprint arXiv:2102.01356, 2021
-
[75]
Delving into Transferable Adversarial Examples and Black-box Attacks
Y. Liu, X. Chen, C. Liu, and D. Song, “Delving into transfer- able adversarial examples and black-box attacks,”arXiv preprint arXiv:1611.02770, 2016
work page internal anchor Pith review Pith/arXiv arXiv 2016
-
[76]
Towards evaluating the robustness of neural networks,
N. Carlini and D. Wagner, “Towards evaluating the robustness of neural networks,” in2017 ieee symposium on security and privacy (sp). Ieee, 2017, pp. 39–57
work page 2017
-
[77]
Generating Adversarial Examples with Adversarial Networks
C. Xiao, B. Li, J.-Y. Zhu, W. He, M. Liu, and D. Song, “Gener- ating adversarial examples with adversarial networks,”arXiv preprint arXiv:1801.02610, 2018
work page internal anchor Pith review Pith/arXiv arXiv 2018
-
[78]
Generating adversarial malware examples for black- box attacks based on GAN,
W. Hu and Y. Tan, “Generating adversarial malware examples for black- box attacks based on GAN,” inInternational Conference on Data Mining and Big Data. Springer, 2022, pp. 409–423
work page 2022
-
[79]
Robust Physical-World Attacks on Deep Learning Models
I. Evtimov, K. Eykholt, E. Fernandes, T. Kohno, B. Li, A. Prakash, A. Rahmati, and D. Song, “Robust physical-world attacks on machine learning models,”arXiv preprint arXiv:1707.08945, vol. 2, no. 3, p. 4, 2017
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[80]
Generic black-box end-to-end attack against state of the art API call based malware clas- sifiers,
I. Rosenberg, A. Shabtai, L. Rokach, and Y. Elovici, “Generic black-box end-to-end attack against state of the art API call based malware clas- sifiers,” inInternational Symposium on Research in Attacks, Intrusions, and Defenses. Springer, 2018, pp. 490–510
work page 2018
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.