关于人工智能时代的对抗性攻击检测:基础,分类和回顾

IF 4.3
Noora Al Roken , Hakim Hacid , Ahmed Bouridane , Abir Hussain
{"title":"关于人工智能时代的对抗性攻击检测:基础,分类和回顾","authors":"Noora Al Roken ,&nbsp;Hakim Hacid ,&nbsp;Ahmed Bouridane ,&nbsp;Abir Hussain","doi":"10.1016/j.iswa.2025.200554","DOIUrl":null,"url":null,"abstract":"<div><div>The rapid advancement and sophisticated deployment of artificial intelligence tools by malicious actors have led to the rise of highly complex cyber-attacks that evolve quickly. This rapid evolution has made traditional defense systems increasingly ineffective at detecting and mitigating these hidden threats. Adversarial attacks are a prime example of such sophisticated cyber-attacks; they subtly alter attack patterns to evade detection by intelligent systems while still maintaining their harmful functionality. This paper provides a comprehensive overview of computer malware, examining both traditional concealment methods and more advanced adversarial techniques. It includes an in-depth analysis of recent research efforts aimed at detecting previously unseen adversarial attacks using both traditional and AI-driven approaches. Furthermore, this study discusses the limitations of current network intrusion detection systems and proposes directions for future research.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200554"},"PeriodicalIF":4.3000,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On adversarial attack detection in the artificial intelligence era: Fundamentals, a taxonomy, and a review\",\"authors\":\"Noora Al Roken ,&nbsp;Hakim Hacid ,&nbsp;Ahmed Bouridane ,&nbsp;Abir Hussain\",\"doi\":\"10.1016/j.iswa.2025.200554\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The rapid advancement and sophisticated deployment of artificial intelligence tools by malicious actors have led to the rise of highly complex cyber-attacks that evolve quickly. This rapid evolution has made traditional defense systems increasingly ineffective at detecting and mitigating these hidden threats. Adversarial attacks are a prime example of such sophisticated cyber-attacks; they subtly alter attack patterns to evade detection by intelligent systems while still maintaining their harmful functionality. This paper provides a comprehensive overview of computer malware, examining both traditional concealment methods and more advanced adversarial techniques. It includes an in-depth analysis of recent research efforts aimed at detecting previously unseen adversarial attacks using both traditional and AI-driven approaches. Furthermore, this study discusses the limitations of current network intrusion detection systems and proposes directions for future research.</div></div>\",\"PeriodicalId\":100684,\"journal\":{\"name\":\"Intelligent Systems with Applications\",\"volume\":\"27 \",\"pages\":\"Article 200554\"},\"PeriodicalIF\":4.3000,\"publicationDate\":\"2025-07-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Intelligent Systems with Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2667305325000808\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intelligent Systems with Applications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667305325000808","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

恶意行为者对人工智能工具的快速发展和复杂部署导致了高度复杂的网络攻击的兴起,这些攻击迅速演变。这种快速发展使得传统的防御系统在检测和减轻这些隐藏的威胁方面越来越无效。对抗性攻击是这种复杂的网络攻击的一个主要例子;它们巧妙地改变攻击模式,以逃避智能系统的检测,同时仍保持其有害的功能。本文提供了计算机恶意软件的全面概述,检查了传统的隐藏方法和更先进的对抗技术。它包括对最近的研究工作的深入分析,旨在使用传统和人工智能驱动的方法检测以前未见过的对抗性攻击。此外,本文还讨论了当前网络入侵检测系统的局限性,并提出了未来的研究方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
On adversarial attack detection in the artificial intelligence era: Fundamentals, a taxonomy, and a review
The rapid advancement and sophisticated deployment of artificial intelligence tools by malicious actors have led to the rise of highly complex cyber-attacks that evolve quickly. This rapid evolution has made traditional defense systems increasingly ineffective at detecting and mitigating these hidden threats. Adversarial attacks are a prime example of such sophisticated cyber-attacks; they subtly alter attack patterns to evade detection by intelligent systems while still maintaining their harmful functionality. This paper provides a comprehensive overview of computer malware, examining both traditional concealment methods and more advanced adversarial techniques. It includes an in-depth analysis of recent research efforts aimed at detecting previously unseen adversarial attacks using both traditional and AI-driven approaches. Furthermore, this study discusses the limitations of current network intrusion detection systems and proposes directions for future research.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.60
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信