Analyze textual data: deep neural network for adversarial inversion attack in wireless networks

被引:0
|
作者
Al Ghamdi, Mohammed A. [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp, Comp Sci & Artificial Intelligence Dept, Mecca, Saudi Arabia
来源
SN APPLIED SCIENCES | 2023年 / 5卷 / 12期
关键词
Artificial intelligence (AI); Natural language processing (NLP); Intrusion detection system (IDS); Deep neural network (DNN); Support vector machine (SVM); MECHANISM;
D O I
10.1007/s42452-023-05565-8
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Deep neural networks (DNN) are highly effective in a number of tasks related to machine learning across different domains. It is quite challenging to apply the information gained to textual data because of its graph representation structure. This article applies innovative graph structures and protection techniques to secure wireless systems and mobile computing applications. We develop an Intrusion Detection System (IDS) with DNN and Support Vector Machine (SVM) to identify adversarial inversion attacks in the network system. It employs both normal and abnormal adversaries. It constantly generates signatures, creates attack signatures, and refreshes the IDS signature repository. In conclusion, the assessment indicators, including latency rates and throughput, are used to evaluate the effectiveness and efficiency of the recommended framework with Random Forest. The results of the proposed model (SVM with DNN) based on adversarial inversion attacks were better and more efficient than traditional models, with a detection rate of 93.67% and 95.34% concerning latency rate and throughput. This article also compares the proposed model (SVM with DNN) accuracy with other classifiers and the accuracy comparison for feature datasets of 90.3% and 90%, respectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] An adversarial attack detection method in deep neural networks based on re-attacking approach
    Ahmadi, Morteza Ali
    Dianat, Rouhollah
    Amirkhani, Hossein
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (07) : 10985 - 11014
  • [42] An adversarial attack detection method in deep neural networks based on re-attacking approach
    Morteza Ali Ahmadi
    Rouhollah Dianat
    Hossein Amirkhani
    Multimedia Tools and Applications, 2021, 80 : 10985 - 11014
  • [43] Hybrid Convolutional Neural Network for Robust Attack Detection in Wireless Sensor Networks
    Sharma, Kanta Prasad
    Hussain, Rifat
    Jaharadak, Adam Amril
    Trawnih, Ali Ahmad
    Verma, Deekhsha
    Dasi, Shivakrishna
    Pant, Shivani
    INTERNET TECHNOLOGY LETTERS, 2025,
  • [44] Frequency constraint-based adversarial attack on deep neural networks for medical image classification
    Chen, Fang
    Wang, Jian
    Liu, Han
    Kong, Wentao
    Zhao, Zhe
    Ma, Longfei
    Liao, Hongen
    Zhang, Daoqiang
    COMPUTERS IN BIOLOGY AND MEDICINE, 2023, 164
  • [45] Attack on Deep Steganalysis Neural Networks
    Li, Shiyu
    Ye, Dengpan
    Jiang, Shunzhi
    Liu, Changrui
    Niu, Xiaoguang
    Luo, Xiangyang
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 265 - 276
  • [46] Inconspicuous Data Augmentation Based Backdoor Attack on Deep Neural Networks
    Xu, Chaohui
    Liu, Wenye
    Zheng, Yue
    Wang, Si
    Chang, Chip-Hong
    2022 IEEE 35TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (IEEE SOCC 2022), 2022, : 237 - 242
  • [47] Adversarial Attack and Defense on Deep Neural Network-Based Voice Processing Systems: An Overview
    Chen, Xiaojiao
    Li, Sheng
    Huang, Hao
    APPLIED SCIENCES-BASEL, 2021, 11 (18):
  • [48] Adversarial attack model based on deep neural network interpretability and artificial fish swarm algorithm
    Li, Yamin
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 614 - 632
  • [49] DATA-FREE WATERMARK FOR DEEP NEURAL NETWORKS BY TRUNCATED ADVERSARIAL DISTILLATION
    Yan, Chao-Bo
    Li, Fang-Qi
    Wang, Shi-Lin
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 4480 - 4484
  • [50] Neural network based traffic prediction for wireless data networks
    Gowrishankar
    Satyanarayana P.S.
    Int. J. Comput. Intell. Syst., 2008, 4 (379-389): : 379 - 389