2022
DOI: 10.1038/s41598-022-06057-2
|View full text |Cite
|
Sign up to set email alerts
|

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Abstract: Due to the growing rise of cyber attacks in the Internet, the demand of accurate intrusion detection systems (IDS) to prevent these vulnerabilities is increasing. To this aim, Machine Learning (ML) components have been proposed as an efficient and effective solution. However, its applicability scope is limited by two important issues: (i) the shortage of network traffic data datasets for attack analysis, and (ii) the data privacy constraints of the data to be used. To overcome these problems, Generative Advers… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…Mozo et al [122] proposed a WGAN-based approach to generate synthetic flow-based network traffic, addressing privacy concerns and providing a viable alternative to real data in ML training processes. Demonstrated in a crypto-mining attack scenario, the study explores diverse neural network architectures and proposes enhancements to improve the quality of synthetic data.…”
Section: Flow-based Network Traffic Generationmentioning
confidence: 99%
“…Mozo et al [122] proposed a WGAN-based approach to generate synthetic flow-based network traffic, addressing privacy concerns and providing a viable alternative to real data in ML training processes. Demonstrated in a crypto-mining attack scenario, the study explores diverse neural network architectures and proposes enhancements to improve the quality of synthetic data.…”
Section: Flow-based Network Traffic Generationmentioning
confidence: 99%
“…Some research proposes techniques for generating datasets, including log line clustering [ 25 ], generating network flows at fragment level [ 26 ], using Generative Adversarial Networks (GANs) to generate datasets [ 27 ], dynamically generating datasets [ 28 ], and using fuzzy association rules to integrate device logs with traffic data [ 29 ].…”
Section: Related Workmentioning
confidence: 99%
“…One of the most innovative aspects of the SPIDER cyber range is its capability to automate offensive tactics by generating synthetic traffic traces. In this regard, a significant effort has been devoted to the study of the application of the recently appeared Generative Adversarial Networks (GANs) to generate synthetic flow-based network traffic to mimic both attacks and normal traffic [17]. In contrast to other approaches using GAN as a data augmentation solution, synthetic data generated in SPIDER can fully replace real data (both attacks and normal traffic).…”
Section: F Synthetic Attack Generation With Gansmentioning
confidence: 99%