An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets

被引:6
|
作者
Xie, Huihui [1 ]
Lv, Kun [1 ]
Hu, Changzhen [1 ]
机构
[1] Beijing Inst Technol, Sch Software, Beijing, Peoples R China
关键词
D O I
10.1109/TrustCom/BigDataSE.2018.00268
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In practice, there are few available attack dataset. Although there are many methods that can be used to simulate cyberattacks for attack data, such as using specific tools, writing scripts to simulate the attack scenes, etc.. The disadvantages of those methods are also obvious. Tools developers and script authors need to know professional network security knowledge. As tools are implemented in different ways, users also need to have some expertise. What's more, it may take a long time to generate a large amount of attack data. In this paper, we present some of the existing network attack tools and proposed a method to generate attack data based on generative adversarial network. Using our method you do not need to have a professional network security knowledge, only use some basic network attack data one can generate a large number of attack data in a very short period of time. As network malicious activities become increasingly complex and diverse, network security analysts face serious challenges. Our method also can generate mixed features attack data by setting training data with different attack types. It has high performance. To test the performance of our method, we did a test and found that it took only 160 seconds to generate a million connection records in a PC with 3.7GHz,4 core CPU and 8G memory.
引用
收藏
页码:1777 / 1784
页数:8
相关论文
共 50 条
  • [1] Learning to Generate Chairs with Generative Adversarial Nets
    Zamyatin, Evgeny
    Filchenkov, Andrey
    7TH INTERNATIONAL YOUNG SCIENTISTS CONFERENCE ON COMPUTATIONAL SCIENCE, YSC2018, 2018, 136 : 200 - 209
  • [2] Fault diagnosis method based on triple generative adversarial nets for imbalanced data
    Su, Changwei
    Wang, Xueren
    Liu, Ruijie
    Guo, Ziyi
    Sang, Shengtian
    Yu, Shuang
    Zhang, Haifeng
    MEASUREMENT SCIENCE AND TECHNOLOGY, 2023, 34 (03)
  • [3] Improved method For Generative Adversarial Nets
    Chen, Yuan
    Lu, He
    Yu, Jie
    Wang, Hao
    2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020), 2020, : 404 - 408
  • [4] Generate medical synthetic data based on generative adversarial network
    Xiang X.
    Wang J.
    Wang Z.
    Duan S.
    Pan H.
    Zhuang R.
    Han P.
    Liu C.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 211 - 224
  • [5] A rub fault recognition method based on generative adversarial nets
    Wei Wang
    Weidong Liu
    Jing Li
    Wei Peng
    Journal of Mechanical Science and Technology, 2020, 34 : 1389 - 1397
  • [6] A Road Extraction Method Based on Conditional Generative Adversarial Nets
    Lu, Chuanwei
    Sun, Qun
    Zhao, Yunpeng
    Sun, Shijie
    Ma, Jingzhen
    Cheng, Mianmian
    Li, Yuanfu
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University, 2021, 46 (06): : 807 - 815
  • [7] A rub fault recognition method based on generative adversarial nets
    Wang, Wei
    Liu, Weidong
    Li, Jing
    Peng, Wei
    JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY, 2020, 34 (04) : 1389 - 1397
  • [8] A Generative Adversarial Nets Method for Monitoring Data Generation on Aircraft Engines
    FU Qiang
    WANG Huawei
    Transactions of Nanjing University of Aeronautics and Astronautics, 2019, 36 (04) : 609 - 616
  • [9] A Generative Adversarial Nets Method for Monitoring Data Generation on Aircraft Engines
    Fu Q.
    Wang H.
    Transactions of Nanjing University of Aeronautics and Astronautics, 2019, 36 (04) : 609 - 616
  • [10] Poisoning Attack in Federated Learning using Generative Adversarial Nets
    Zhang, Jiale
    Chen, Junjun
    Wu, Di
    Chen, Bing
    Yu, Shui
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 374 - 380