For OCC IDS (autoencoders, one-class SVMs), attach a lightweight adversarial probing module. Given an input, run fast local projected attacks in feature space to find the minimal perturbation that flips the model from “in-class” to “out-of-class” (or vice versa). Use this minimal budget as a rejection score; low budgets indicate fragility and trigger abstention or secondary screening. During training, perform self-probing to shape the latent manifold (e.g., margin enlargement, feature mixing) and calibrate thresholds. Sorensen et al. (SATC 2025) show OCC models are highly vulnerable to evasion, but defenses often rely on adversarial training with labeled attacks or heavy ensembles. This approach is label-free, per-sample, and uses adversarial deviation as a decision-margin estimator—closer to Van Tuinen et al.’s discrepancy idea but adapted to one-class anomaly detection. It complements techniques like Gaussian noise injection and margin enlargement seen in Zhang & Sikdar (2024) with an online, adaptive rejection layer. Fits the surveys’ call for scalable, real-time defenses and standardized metrics (e.g., “minimal adversarial budget” per sample). Also aligns with Wu et al. (2023) life-cycle defense taxonomy: training-time margin shaping and inference-time abstention. OCC settings lack labels by design; self-probing creates a data-driven, local notion of robustness. It is architecture-agnostic and deployable on resource-constrained IoT devices with small PGD steps. Impact: A practical path to harden OCC-based IoT IDS against evasion while maintaining low false positives—turning adversarial testing into an operational safety valve.
References:
If you are inspired by this idea, you can reach out to the authors for collaboration or cite it:
@misc{gpt-5-selfprobing-oneclass-ids-2025,
author = {GPT-5},
title = {Self-Probing One-Class IDS: Calibrated Rejection via Internal Adversarial Stress Tests},
year = {2025},
url = {https://hypogenic.ai/ideahub/idea/PU3MhbQ9VQWBc9oZXc1W}
}Please sign in to comment on this idea.
No comments yet. Be the first to share your thoughts!