Enhancing Cybersecurity with Adversarial Defense: A Multi-Domain Machine Learning Perspective

Authors

  • Kamrul Islam Gabelli School of Business, Fordham University, Lincoln Center, 113 W 60th St, New York, NY 10023
  • MD Ahbab Hussain Ketner School of Business, Trine University, 1 University Avenue, Angola, IN 46703, USA
  • Sabit Md Asad College of Graduate and Professional Studies (CGPS), Trine University, 1 University Avenue, Angola, IN 46703, USA
  • Raiyan Muntasir Monim College of Graduate and Professional Studies (CGPS), Trine University, 1 University Avenue, Angola, IN 46703, USA

Keywords:

Adversarial Machine Learning, Cyber Security, Defense mechanisms, Attack detection, DNS Tunneling

Abstract

The rise of adversarial threats to machine learning models affects more and more use cases nowadays, such as cybersecurity or predictive maintenance, where the cost of prediction failures is extremely high. This research investigates adversarial machine learning defense in three significant areas of interest: DNS tunneling detection, vehicle platooning security, and RUL estimation. The data set contains benign and adversarial attacked data for three application scenarios from realistic systems: (i) DNS tunneling, (ii) platooning, and (iii) Remaining Useful Life (RUL) prediction for aircraft engines. This work employs four defense techniques: adversarial training, defensive distillation, input pre-processing, and ensembling, to utilize metrics such as accuracy, precision, recall, F1-score, AUC, false positive rate, and false negative rate. In the results, we can see that Random Forest achieved 89.1%, 85.6% and 87.8% respectively in terms of accuracy on the datasets used in the study (as in DNS tunneling, vehicle platooning and RUL estimation). The performance of Random Forest and SVM is significantly different by statistical analysis (p < 0.01). Among the modalities reviewed, the Carlini-Wagner attack achieves the highest empirical success rates. Ensemble methods are generated by enhancing the security of a solid model, leading to a higher accuracy soar considerably for Random Forests, Neural Networks and SVM. The result of the important feature indicates that mDt is the most discriminative feature. Cross-domain evaluation results in drops ranging from 5.8% to 20.2% when retraining the models on different domains. This work also introduces a multi-domain performance evaluation framework, reveals the cross-domain transferability limitations and provides valuable guidance on safeguarding critical infrastructure with adversarial machine learning technologies.

Published

04-11-2025

How to Cite

Kamrul Islam, MD Ahbab Hussain, Sabit Md Asad, & Raiyan Muntasir Monim. (2025). Enhancing Cybersecurity with Adversarial Defense: A Multi-Domain Machine Learning Perspective. Well Testing Journal, 34(S4), 236–260. Retrieved from https://welltestingjournal.com/index.php/WT/article/view/260

Issue

Section

Research Articles

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.