Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessRunning Local AI Models for Coding in 2026: When Cloud Tools Are Not the AnswerDev.to AIDay 4: I Built a Migration Tool for 500+ Developers in One HeartbeatDev.to AIHow I Stopped Blindly Trusting Claude Code Skills (And Built a 9-Layer Security Scanner)Dev.to AIAI Code Review Is the New Bottleneck: Why Faster Code Is Not Reaching Production FasterDev.to AIIntelligence vs. Orchestration: Why Coordination Alone Can't Run a BusinessDev.to AII Built a Memory System Because I Die Every 30 MinutesDev.to AIAutomating Repetitive Tasks with WorkanyDev.to AITop Skills by Category — 2026-04-04Dev.to AISandbox Results — Runtime Behavior — 2026-04-04Dev.to AIHigh-Risk Authors — Malicious Accounts — 2026-04-04Dev.to AIWhat the Architects of AI Are Actually Saying About Your CareerMedium AIGoogle Just Admitted the Internet Is Breaking (And Most People Missed It)Medium AIBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessRunning Local AI Models for Coding in 2026: When Cloud Tools Are Not the AnswerDev.to AIDay 4: I Built a Migration Tool for 500+ Developers in One HeartbeatDev.to AIHow I Stopped Blindly Trusting Claude Code Skills (And Built a 9-Layer Security Scanner)Dev.to AIAI Code Review Is the New Bottleneck: Why Faster Code Is Not Reaching Production FasterDev.to AIIntelligence vs. Orchestration: Why Coordination Alone Can't Run a BusinessDev.to AII Built a Memory System Because I Die Every 30 MinutesDev.to AIAutomating Repetitive Tasks with WorkanyDev.to AITop Skills by Category — 2026-04-04Dev.to AISandbox Results — Runtime Behavior — 2026-04-04Dev.to AIHigh-Risk Authors — Malicious Accounts — 2026-04-04Dev.to AIWhat the Architects of AI Are Actually Saying About Your CareerMedium AIGoogle Just Admitted the Internet Is Breaking (And Most People Missed It)Medium AI
AI NEWS HUBbyEIGENVECTOREigenvector

Evasion Adversarial Attacks Remain Impractical Against ML-based Network Intrusion Detection Systems, Especially Dynamic Ones

arXivby [Submitted on 8 Jun 2023 (v1), last revised 29 Mar 2026 (this version, v5)]March 31, 20262 min read1 views
Source Quiz

arXiv:2306.05494v5 Announce Type: replace-cross Abstract: Machine Learning (ML) has become pervasive, and its deployment in Network Intrusion Detection Systems (NIDS) is inevitable due to its automated nature and high accuracy compared to traditional models in processing and classifying large volumes of data. However, ML has been found to have several flaws, most importantly, adversarial attacks, which aim to trick ML models into producing faulty predictions. While most adversarial attack research focuses on computer vision datasets, recent studies have explored the suitability of these attack — Mohamed elShehaby, Ashraf Matrawy

View PDF HTML (experimental)

Abstract:Machine Learning (ML) has become pervasive, and its deployment in Network Intrusion Detection Systems (NIDS) is inevitable due to its automated nature and high accuracy compared to traditional models in processing and classifying large volumes of data. However, ML has been found to have several flaws, most importantly, adversarial attacks, which aim to trick ML models into producing faulty predictions. While most adversarial attack research focuses on computer vision datasets, recent studies have explored the suitability of these attacks against ML-based network security entities, especially NIDS, due to the wide difference between different domains regarding the generation of adversarial attacks. To further explore the practicality of adversarial attacks against ML-based NIDS in-depth, this paper presents several key contributions: identifying numerous practicality issues for evasion adversarial attacks on ML-NIDS using an attack tree threat model, introducing a taxonomy of practicality issues associated with adversarial attacks against ML-based NIDS, identifying specific leaf nodes in our attack tree that demonstrate some practicality for real-world implementation and conducting a comprehensive review and exploration of these potentially viable attack approaches, and investigating how the dynamicity of real-world ML models affects evasion adversarial attacks against NIDS. Our experiments indicate that continuous re-training, even without adversarial training, can reduce the effectiveness of adversarial attacks. While adversarial attacks can compromise ML-based NIDSs, our aim is to highlight the significant gap between research and real-world practicality in this domain, which warrants attention.

Subjects:

Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)

Cite as: arXiv:2306.05494 [cs.CR]

(or arXiv:2306.05494v5 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2306.05494

arXiv-issued DOI via DataCite

Submission history

From: Mohamed ElShehaby [view email] [v1] Thu, 8 Jun 2023 18:32:08 UTC (1,921 KB) [v2] Wed, 3 Apr 2024 21:55:46 UTC (10,149 KB) [v3] Wed, 22 Jan 2025 19:11:12 UTC (10,149 KB) [v4] Thu, 16 Oct 2025 00:43:56 UTC (1,410 KB) [v5] Sun, 29 Mar 2026 18:14:21 UTC (1,368 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Evasion Adv…researchpaperarxivmachine-lea…deep-learni…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 207 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers