Adversarial Machine Learning in Cybersecurity: Attacks and Defenses
DOI:
https://doi.org/10.53469/ijomsr.2025.08(02).04Keywords:
Adversarial Machine Learning, Cybersecurity, RobustnessAbstract
Adversarial Machine Learning (AML) refers to the research field that involves testing and improving machine learning models by introducing adversarial samples or attack techniques. In the cybersecurity domain, AML has significant potential to help identify and defend against threats such as malware, cyber attacks, and identity fraud. However, AML also faces numerous challenges, including low efficiency in generating adversarial samples, insufficient stealth, and issues with the generality and adaptability of defense methods. There is a dynamic interplay between adversarial attacks and defenses, with attackers continually developing new techniques and defenders needing to constantly improve their defense strategies. This interaction drives the rapid development of AML technology, making it increasingly important in cybersecurity. By deeply studying the interplay between adversarial attacks and defenses, the robustness and reliability of cybersecurity systems can be effectively enhanced, laying the foundation for future AI development in cybersecurity.
References
Yu Pengwen. Legal nature and application rules of artificial intelligence evidence in criminal proceedings [J]. Chinese Journal of Criminal Law, 2024, (05): 36-54. DOI: 10.19430/j.cnki.3891.2024.05.010.
Wei Kuo, et al. Strategic application of AI intelligent algorithm in network threat detection and defense [J]. Journal of Theory and Practice of Engineering Science, 2024, 4(01): 49-57.
Chen Wangmei, et al. Applying machine learning algorithm to optimize personalized education recommendation system [J]. Journal of Theory and Practice of Engineering Science, 2024, 4(01): 101-108.
Sun Jin. Application of machine learning in network anomaly detection [J]. Information and Computer (Theory Edition), 2024, 36(09): 81-83.
Hao Ning. Research on network security management application based on artificial intelligence technology [J]. Information Recording Materials, 2024, 25(02): 66-68. DOI: 10.16009/j.cnki.cn13-1295/tq.2024.02.021.
Wang Lingtong, Wang Huiling, Xu Miao, et al. Overview of detection and defense technologies for cross-site scripting attacks [J]. Journal of Computer Applications, 2024, 41(03): 652-662. DOI: 10.19734/j.issn.1001-3695.2023.06.0286.
Tian Miao, et al. The application of artificial intelligence in medical diagnostics: A new frontier [J]. Academic Journal of Science and Technology, 2023, 8(2): 57-61.
Chen Heyao, et al. Threat detection driven by artificial intelligence: Enhancing cybersecurity with machine learning algorithms [J]. 2024.
Huang Qimeng, Wu Miaomiao, Li Yun. Research on filtering adversarial feature selection for evasion attacks [J]. Telecommunications Science, 2023, 39(07): 46-58.
Gao Ying, Chen Xiaofeng, Zhang Yiyu, et al. Overview of attack and defense technologies in federated learning systems [J]. Journal of Computer Science, 2023, 46(09): 1781-1805.
Du Shuqian, et al. Improving science question ranking with model and retrieval-augmented generation [C]. The 6th International Scientific and Practical Conference “Old and New Technologies of Learning Development in Modern Conditions,” Berlin, Germany: International Science Group, 2024: 252.
Cheng Shiwei, et al. 3D Pop-Ups: Omnidirectional image visual saliency prediction based on crowdsourced eye-tracking data in VR [J]. Displays, 2024, 83: 102746. Elsevier.
Hu Shengqiu, Li Youguo, Gao Yuan, et al. Internet of Things security detection method based on adversarial deep learning [J]. Electronic Design Engineering, 2022, 30(11): 50-54+59. DOI: 10.14022/j.issn1674-6236.2022.11.011.
Lin Sifang, et al. Artificial intelligence and electroencephalogram analysis: Innovative methods for optimizing anesthesia depth [J]. Journal of Theory and Practice in Engineering and Technology, 2024, 1(4): 1-10.
Zhou Siming, Li Dan. Attacks and defenses in public clouds based on machine learning [J]. Network Security Technology & Application, 2022, (01): 70-72.
Liu Qixu, Wang Junnan, Yin Jie, et al. Application of adversarial machine learning in network intrusion detection [J]. Journal of Communications, 2021, 42(11): 1-12.
Du Shuqian, et al. Improving science question ranking with model and retrieval-augmented generation [C]. The 6th International Scientific and Practical Conference “Old and New Technologies of Learning Development in Modern Conditions,” Berlin, Germany: International Science Group, 2024: 252.
Zhao Lemen, Wang Rui. Data science platform: Features, technologies, and trends [J]. Computer Science, 2021, 48(08): 1-12.
Cheng Shiwei, et al. Poster graphic design with your eyes: An approach to automatic textual layout design based on visual perception [J]. Displays, 2023, 79: 102458. Elsevier.
Yang Qi, Jia Peng, Liu Jiayong. Generation of DOCX adversarial samples based on DCGAN [J]. Modern Computer, 2021, (15): 77-81.