• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于生成对抗网络的合成流量型加密货币挖掘攻击生成。

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks.

机构信息

Universidad Politécnica de Madrid, Madrid, Spain.

Universidad Complutense de Madrid, Madrid, Spain.

出版信息

Sci Rep. 2022 Feb 8;12(1):2091. doi: 10.1038/s41598-022-06057-2.

DOI:10.1038/s41598-022-06057-2
PMID:35136144
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8825844/
Abstract

Due to the growing rise of cyber attacks in the Internet, the demand of accurate intrusion detection systems (IDS) to prevent these vulnerabilities is increasing. To this aim, Machine Learning (ML) components have been proposed as an efficient and effective solution. However, its applicability scope is limited by two important issues: (i) the shortage of network traffic data datasets for attack analysis, and (ii) the data privacy constraints of the data to be used. To overcome these problems, Generative Adversarial Networks (GANs) have been proposed for synthetic flow-based network traffic generation. However, due to the ill-convergence of the GAN training, none of the existing solutions can generate high-quality fully synthetic data that can totally substitute real data in the training of ML components. In contrast, they mix real with synthetic data, which acts only as data augmentation components, leading to privacy breaches as real data is used. In sharp contrast, in this work we propose a novel and deterministic way to measure the quality of the synthetic data produced by a GAN both with respect to the real data and to its performance when used for ML tasks. As a by-product, we present a heuristic that uses these metrics for selecting the best performing generator during GAN training, leading to a novel stopping criterion, which can be applied even when different types of synthetic data are to be used in the same ML task. We demonstrate the adequacy of our proposal by generating synthetic cryptomining attacks and normal traffic flow-based data using an enhanced version of a Wasserstein GAN. The results evidence that the generated synthetic network traffic can completely replace real data when training a ML-based cryptomining detector, obtaining similar performance and avoiding privacy violations, since real data is not used in the training of the ML-based detector.

摘要

由于互联网中网络攻击的日益增多,对准确的入侵检测系统 (IDS) 的需求也在不断增加,以防止这些漏洞。为此,机器学习 (ML) 组件被提出作为一种高效、有效的解决方案。然而,其适用范围受到两个重要问题的限制:(i)用于攻击分析的网络流量数据数据集短缺,以及(ii)要使用的数据的数据隐私限制。为了克服这些问题,生成对抗网络 (GAN) 被提出用于基于流的网络流量的合成生成。然而,由于 GAN 训练的不收敛性,现有的解决方案都无法生成高质量的完全合成数据,这些数据可以完全替代 ML 组件训练中的真实数据。相反,它们将真实数据与合成数据混合,这仅作为数据增强组件,从而导致隐私泄露,因为使用了真实数据。相比之下,在这项工作中,我们提出了一种新颖而确定的方法,用于衡量 GAN 生成的合成数据相对于真实数据的质量,以及在用于 ML 任务时的性能。作为副产品,我们提出了一种启发式方法,该方法使用这些指标在 GAN 训练期间选择性能最佳的生成器,从而得出一种新颖的停止准则,即使在同一 ML 任务中要使用不同类型的合成数据时,也可以应用该准则。我们使用改进的 Wasserstein GAN 生成加密挖掘攻击和正常流量的基于流的合成数据来证明我们的提议的充分性。结果表明,在训练基于 ML 的加密挖掘检测器时,生成的合成网络流量可以完全替代真实数据,同时获得相似的性能并避免隐私侵犯,因为在基于 ML 的检测器的训练中不使用真实数据。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/0c2601f282e8/41598_2022_6057_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/a4aa95036744/41598_2022_6057_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/48c79be42d17/41598_2022_6057_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/716b8aadeb33/41598_2022_6057_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/322e55da707c/41598_2022_6057_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/d3734d31afdf/41598_2022_6057_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/0c2601f282e8/41598_2022_6057_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/a4aa95036744/41598_2022_6057_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/48c79be42d17/41598_2022_6057_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/716b8aadeb33/41598_2022_6057_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/322e55da707c/41598_2022_6057_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/d3734d31afdf/41598_2022_6057_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a584/8825844/0c2601f282e8/41598_2022_6057_Fig6_HTML.jpg

相似文献

1
Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks.基于生成对抗网络的合成流量型加密货币挖掘攻击生成。
Sci Rep. 2022 Feb 8;12(1):2091. doi: 10.1038/s41598-022-06057-2.
2
Generative adversarial network based synthetic data training model for lightweight convolutional neural networks.用于轻量级卷积神经网络的基于生成对抗网络的合成数据训练模型。
Multimed Tools Appl. 2023 May 20:1-23. doi: 10.1007/s11042-023-15747-6.
3
Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network.开发机器学习入侵检测系统并使用生成对抗网络测试其性能。
Sensors (Basel). 2023 Jan 24;23(3):1315. doi: 10.3390/s23031315.
4
DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection.深度强化学习生成对抗网络(DRL-GAN):一种用于二进制和多类网络入侵检测的混合方法。
Sensors (Basel). 2024 Apr 25;24(9):2746. doi: 10.3390/s24092746.
5
Adversarial attacks against supervised machine learning based network intrusion detection systems.对抗攻击对基于监督机器学习的网络入侵检测系统的影响。
PLoS One. 2022 Oct 14;17(10):e0275971. doi: 10.1371/journal.pone.0275971. eCollection 2022.
6
SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.SGAN-IDS:基于自注意力机制的对抗入侵检测系统的生成对抗网络。
Sensors (Basel). 2023 Sep 11;23(18):7796. doi: 10.3390/s23187796.
7
Utilization of Synthetic Near-Infrared Spectra via Generative Adversarial Network to Improve Wood Stiffness Prediction.利用生成对抗网络的合成近红外光谱提高木材硬度预测
Sensors (Basel). 2024 Mar 21;24(6):1992. doi: 10.3390/s24061992.
8
Backdoor attack and defense in federated generative adversarial network-based medical image synthesis.联邦生成对抗网络的后门攻击与防御在医学图像合成中的应用。
Med Image Anal. 2023 Dec;90:102965. doi: 10.1016/j.media.2023.102965. Epub 2023 Sep 22.
9
CTAB-GAN+: enhancing tabular data synthesis.CTAB-GAN+:增强表格数据合成
Front Big Data. 2024 Jan 8;6:1296508. doi: 10.3389/fdata.2023.1296508. eCollection 2023.
10
Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks.基于分布强化学习和生成对抗网络的工业物联网异常检测。
Sensors (Basel). 2022 Oct 22;22(21):8085. doi: 10.3390/s22218085.

引用本文的文献

1
Research on Network Intrusion Detection Model Based on Hybrid Sampling and Deep Learning.基于混合采样与深度学习的网络入侵检测模型研究
Sensors (Basel). 2025 Mar 4;25(5):1578. doi: 10.3390/s25051578.
2
Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection.防火墙日志中异常检测方法的比较分析:整合安全日志的轻量级合成与人工生成的攻击检测
Sensors (Basel). 2024 Apr 20;24(8):2636. doi: 10.3390/s24082636.
3
B5GEMINI: AI-Driven Network Digital Twin.

本文引用的文献

1
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends.网络靶场与试验床综述:现状与未来趋势
Sensors (Basel). 2020 Dec 13;20(24):7148. doi: 10.3390/s20247148.
B5GEMINI:人工智能驱动的网络数字孪生。
Sensors (Basel). 2022 May 28;22(11):4106. doi: 10.3390/s22114106.