2019
DOI: 10.1016/j.cose.2018.12.012
|View full text |Cite
|
Sign up to set email alerts
|

Flow-based network traffic generation using Generative Adversarial Networks

Abstract: Flow-based data sets are necessary for evaluating network-based intrusion detection systems (NIDS). In this work, we propose a novel methodology for generating realistic flow-based network traffic. Our approach is based on Generative Adversarial Networks (GANs) which achieve good results for image generation.A major challenge lies in the fact that GANs can only process continuous attributes. However, flow-based data inevitably contain categorical attributes such as IP addresses or port numbers. Therefore, we p… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
80
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 153 publications
(80 citation statements)
references
References 29 publications
0
80
0
Order By: Relevance
“…It can attain very excellent anomaly detection efficiency in network traffic data by extracting the CNN's spatial characteristics and the LSTM model's temporal characteristics. In [17], Markus Ring et al suggested a new technique to produce pseudo-NetFlow information based on the generation of an anti-neural network (GAN), which can produce excellent outcomes for detection and generation. The primary challenge is that GAN can handle only ongoing characteristics, and Net-Flow generally has various characteristics of classification.…”
Section: B Related Workmentioning
confidence: 99%
“…It can attain very excellent anomaly detection efficiency in network traffic data by extracting the CNN's spatial characteristics and the LSTM model's temporal characteristics. In [17], Markus Ring et al suggested a new technique to produce pseudo-NetFlow information based on the generation of an anti-neural network (GAN), which can produce excellent outcomes for detection and generation. The primary challenge is that GAN can handle only ongoing characteristics, and Net-Flow generally has various characteristics of classification.…”
Section: B Related Workmentioning
confidence: 99%
“…packet byte-streams to be even harder to generate abiding to constraints but easier to break because the detector has more inputs that can be modified by an attacker. Recent work has focused on generating real packet traffic [5,11] and network flows [15] to improve datasets used in malware traffic detection using Generative Adversarial Networks. The flow-based approach relies entirely on the GAN to generate adversarial flows, yet it may be impossible to craft such a flow.…”
Section: Related Workmentioning
confidence: 99%
“…Network traffic generation using GANs has been considered for detecting intrusion, dataset augmentation, or illegality detection [6], [45], [46]. Ring et al [47] introduced flow-based traffic generation using GAN. This work aims to generate realistic network traffic to aid intrusion detection systems (IDS).…”
Section: Background and Related Workmentioning
confidence: 99%