Adversarial Attacks in Cybersecurity: A Machine Learning Perspective

Authors

  • Fatima Rilwan Ododo Department of Computer Science, Montana State University Bozeman, MT 59717, USA Author https://orcid.org/0009-0004-3186-7528
  • Ridwan Rahmat Sadiq Department of Computer Science, Nasarawa State University Keffi, Nigeria Author

Abstract

Adversarial machine learning (AML) presents a critical threat to the integrity of machine learning (ML) systems deployed in cybersecurity, where adversarial examples can maintain malicious functionality while evading detection. This literature review synthesizes findings from 35 peer-reviewed sources to investigate the taxonomy, attack strategies, and defense mechanisms associated with AML in cybersecurity domains such as intrusion detection systems (IDS), malware analysis, industrial control systems (ICS), and reinforcement learning in cyber-physical systems. We categorize attacks based on knowledge level, timing, and specificity, and highlight the unique challenges of functionality-preserving adversarial inputs in discrete, protocol-constrained environments. The review further evaluates defensive techniques—including adversarial training, detection frameworks, model hardening, and secure lifecycle integration—and identifies key limitations such as domain-specific overfitting, poor generalizability, and lack of standardized benchmarks. We conclude by advocating for robust, adaptive defenses, attacker-aware datasets, and security-by-design approaches that embed adversarial resilience into the entire ML development lifecycle.

Keywords:

Adversarial Machine Learning, Cybersecurity, Evasion Attacks, Intrusion Detection Systems, Malware Detection, Industrial Control Systems, Model Robustness, Adversarial Training, Functionality-Preserving Attacks, Secure Machine Learning Lifecycle

Downloads

ACCESSES

DOI: 10.70382/ajsitr.v7i9.031
Views: 272  
Downloads: 150  

Published

2025-05-26

Issue

Section

Articles

How to Cite

Ododo, F. R., & Sadiq, R. R. (2025). Adversarial Attacks in Cybersecurity: A Machine Learning Perspective. Journal of Science Innovation and Technology Research, 7(9). https://doi.org/10.70382/ajsitr.v7i9.031

Share

PlumX

Similar Articles

11-20 of 62

You may also start an advanced similarity search for this article.