Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

被引:0
|
作者
Alberto Mozo
Ángel González-Prieto
Antonio Pastor
Sandra Gómez-Canaval
Edgar Talavera
机构
[1] Universidad Politécnica de Madrid,
[2] Universidad Complutense de Madrid,undefined
[3] Instituto de Ciencias Matemáticas (CSIC-UAM-UCM-UC3M),undefined
[4] Telefónica I+D,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Due to the growing rise of cyber attacks in the Internet, the demand of accurate intrusion detection systems (IDS) to prevent these vulnerabilities is increasing. To this aim, Machine Learning (ML) components have been proposed as an efficient and effective solution. However, its applicability scope is limited by two important issues: (i) the shortage of network traffic data datasets for attack analysis, and (ii) the data privacy constraints of the data to be used. To overcome these problems, Generative Adversarial Networks (GANs) have been proposed for synthetic flow-based network traffic generation. However, due to the ill-convergence of the GAN training, none of the existing solutions can generate high-quality fully synthetic data that can totally substitute real data in the training of ML components. In contrast, they mix real with synthetic data, which acts only as data augmentation components, leading to privacy breaches as real data is used. In sharp contrast, in this work we propose a novel and deterministic way to measure the quality of the synthetic data produced by a GAN both with respect to the real data and to its performance when used for ML tasks. As a by-product, we present a heuristic that uses these metrics for selecting the best performing generator during GAN training, leading to a novel stopping criterion, which can be applied even when different types of synthetic data are to be used in the same ML task. We demonstrate the adequacy of our proposal by generating synthetic cryptomining attacks and normal traffic flow-based data using an enhanced version of a Wasserstein GAN. The results evidence that the generated synthetic network traffic can completely replace real data when training a ML-based cryptomining detector, obtaining similar performance and avoiding privacy violations, since real data is not used in the training of the ML-based detector.
引用
收藏
相关论文
共 50 条
  • [21] Generative Adversarial Networks for Synthetic Defect Generation in Assembly and Test Manufacturing
    Singh, Rajhans
    Garg, Ravi
    Patel, Nital S.
    Braun, Martin W.
    [J]. 2020 31ST ANNUAL SEMI ADVANCED SEMICONDUCTOR MANUFACTURING CONFERENCE (ASMC), 2020,
  • [22] Synthetic Traffic Sign Image Generation Applying Generative Adversarial Networks
    Dewi, Christine
    Chen, Rung-Ching
    Liu, Yan-Ting
    [J]. VIETNAM JOURNAL OF COMPUTER SCIENCE, 2022, 09 (03) : 333 - 348
  • [23] Architectural Facade Recognition and Generation through Generative Adversarial Networks
    Yu, Qiu
    Malaeb, Jamal
    Ma, Wenjun
    [J]. 2020 INTERNATIONAL CONFERENCE ON BIG DATA & ARTIFICIAL INTELLIGENCE & SOFTWARE ENGINEERING (ICBASE 2020), 2020, : 310 - 316
  • [24] Structural Plan Schema Generation Through Generative Adversarial Networks
    Kosencig, Kamile ozturk
    Okuyucu, Elif Bahar
    Balaban, Ozgun
    [J]. NEXUS NETWORK JOURNAL, 2024, 26 (02) : 409 - 427
  • [25] Structural Plan Schema Generation Through Generative Adversarial Networks
    Kamile Öztürk Kösenciğ
    Elif Bahar Okuyucu
    Özgün Balaban
    [J]. Nexus Network Journal, 2024, 26 : 409 - 427
  • [26] Synthetic 3D Ultrasonic Scan Generation Using Optical Flow and Generative Adversarial Networks
    Posilovic, Luka
    Medak, Duje
    Subasic, Marko
    Petkovic, Tomislav
    Budimir, Marko
    Loncaric, Sven
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL SYMPOSIUM ON IMAGE AND SIGNAL PROCESSING AND ANALYSIS (ISPA 2021), 2021, : 213 - 218
  • [27] Sparse Adversarial Attack on Modulation Recognition with Adversarial Generative Networks
    Liang, Kui
    Liu, Zhidong
    Zhao, Xin
    Zeng, Cheng
    Cai, Jun
    [J]. 2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 104 - 108
  • [28] Synthetic attack data generation model applying generative adversarial network for intrusion detection
    Kumar, Vikash
    Sinha, Ditipriya
    [J]. COMPUTERS & SECURITY, 2023, 125
  • [29] CBCT-based synthetic CT generation using generative adversarial networks with disentangled representation
    Liu, Jiwei
    Yan, Hui
    Cheng, Hanlin
    Liu, Jianfei
    Sun, Pengjian
    Wang, Boyi
    Mao, Ronghu
    Du, Chi
    Luo, Shengquan
    [J]. QUANTITATIVE IMAGING IN MEDICINE AND SURGERY, 2021, 11 (12) : 4820 - +
  • [30] Multiple flow-based knowledge transfer via adversarial networks
    Yeo, D.
    Bae, J-H
    [J]. ELECTRONICS LETTERS, 2019, 55 (18) : 989 - 991