Proceedings of the 18th ACM Workshop on Hot Topics in Networks 2019
DOI: 10.1145/3365609.3365854
|View full text |Cite
|
Sign up to set email alerts
|

Towards Oblivious Network Analysis using Generative Adversarial Networks

Abstract: Modern systems across diverse application domains (e.g., IoT, automotive) have many black-box devices whose internal structures and/or protocol formats are unknown. We currently lack the tools to systematically understand the behavior and learn the security weaknesses of these black-box devices. Such tools could enable many use cases, such as: 1) identifying input packets that lead to network attacks; and 2) inferring the format of unknown protocols. Our goal is to enable oblivious network analysis which can p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Although RareGAN is primarily motivated from the applications in security, networking, and systems, we also consider image generation, both as a useful tool in its own right and to visualize the improvements. This work builds on our previous workshop paper (Section 4.2 of (Lin et al 2019)). The version with full appendix is at (Lin et al 2022).…”
Section: Introductionmentioning
confidence: 91%
See 3 more Smart Citations
“…Although RareGAN is primarily motivated from the applications in security, networking, and systems, we also consider image generation, both as a useful tool in its own right and to visualize the improvements. This work builds on our previous workshop paper (Section 4.2 of (Lin et al 2019)). The version with full appendix is at (Lin et al 2022).…”
Section: Introductionmentioning
confidence: 91%
“…Server operators want to know which requests trigger these amplification attacks to e.g., drop attack requests. Prior solutions require detailed information about the server, such as source code (Rossow 2014), which may be unavailable (Lin et al 2019).…”
Section: Problem Formulation and Use Casesmentioning
confidence: 99%
See 2 more Smart Citations
“…They intend to generate valid network packets using GANs. In [13], Z. Lin et al describe preliminary works on how to use GANs for oblivious network analysis, that is, to learn the internal structures and protocol formats of black-box devices. To this purpose, they develop synthetic protocols to show that a GAN is able to learn intra-field and inter-field dependencies, ultimately generating compliant packets for a black-box protocol.…”
Section: Related Workmentioning
confidence: 99%