Analyze textual data: deep neural network for adversarial inversion attack in wireless networks

被引:0
|
作者
Al Ghamdi, Mohammed A. [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp, Comp Sci & Artificial Intelligence Dept, Mecca, Saudi Arabia
来源
SN APPLIED SCIENCES | 2023年 / 5卷 / 12期
关键词
Artificial intelligence (AI); Natural language processing (NLP); Intrusion detection system (IDS); Deep neural network (DNN); Support vector machine (SVM); MECHANISM;
D O I
10.1007/s42452-023-05565-8
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Deep neural networks (DNN) are highly effective in a number of tasks related to machine learning across different domains. It is quite challenging to apply the information gained to textual data because of its graph representation structure. This article applies innovative graph structures and protection techniques to secure wireless systems and mobile computing applications. We develop an Intrusion Detection System (IDS) with DNN and Support Vector Machine (SVM) to identify adversarial inversion attacks in the network system. It employs both normal and abnormal adversaries. It constantly generates signatures, creates attack signatures, and refreshes the IDS signature repository. In conclusion, the assessment indicators, including latency rates and throughput, are used to evaluate the effectiveness and efficiency of the recommended framework with Random Forest. The results of the proposed model (SVM with DNN) based on adversarial inversion attacks were better and more efficient than traditional models, with a detection rate of 93.67% and 95.34% concerning latency rate and throughput. This article also compares the proposed model (SVM with DNN) accuracy with other classifiers and the accuracy comparison for feature datasets of 90.3% and 90%, respectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Trust Region Based Adversarial Attack on Neural Networks
    Yao, Zhewei
    Gholami, Amir
    Xu, Peng
    Keutzer, Kurt
    Mahoney, Michael W.
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 11342 - 11351
  • [32] Imperceptible Adversarial Attack via Invertible Neural Networks
    Chen, Zihan
    Wang, Ziyue
    Huang, Jun-Jie
    Zhao, Wentao
    Liu, Xiao
    Guan, Dejian
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 1, 2023, : 414 - 424
  • [33] Label flipping adversarial attack on graph neural network
    Wu Y.
    Liu W.
    Yu H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 65 - 74
  • [34] Wireless Network Attack Defense Algorithm Using Deep Neural Network in Internet of Things Environment
    Wang, Xifeng
    Zhang, Xiaoluan
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2019, 26 (03) : 143 - 151
  • [35] Wireless Network Attack Defense Algorithm Using Deep Neural Network in Internet of Things Environment
    Xifeng Wang
    Xiaoluan Zhang
    International Journal of Wireless Information Networks, 2019, 26 : 143 - 151
  • [36] Adversarial Attacks Impact on the Neural Network Performance and Visual Perception of Data under Attack
    Usoltsev, Yakov
    Lodonova, Balzhit
    Shelupanov, Alexander
    Konev, Anton
    Kostyuchenko, Evgeny
    INFORMATION, 2022, 13 (02)
  • [37] An optimized deep neural network based DoS attack detection in wireless video sensor network
    Ramesh, S.
    Yaashuwanth, C.
    Prathibanandhi, K.
    Basha, Adam Raja
    Jayasankar, T.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [38] A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability?
    Huang, Xiaowei
    Kroening, Daniel
    Ruan, Wenjie
    Sharp, James
    Sun, Youcheng
    Thamo, Emese
    Wu, Min
    Yi, Xinping
    COMPUTER SCIENCE REVIEW, 2020, 37
  • [39] DTFA: Adversarial attack with discrete cosine transform noise and target features on deep neural networks
    Yang, Dong
    Chen, Wei
    Wei, Songjie
    IET IMAGE PROCESSING, 2023, 17 (05) : 1464 - 1477
  • [40] A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks
    Kuang, Xiaohui
    Liu, Hongyi
    Wang, Ye
    Zhang, Qikun
    Zhang, Quanxin
    Zheng, Jun
    IEEE ACCESS, 2019, 7 : 172938 - 172947