• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过生成对抗网络(GANs)生成的零日攻击数据样本对深度学习分类器的有效性。

The Effectiveness of Zero-Day Attacks Data Samples Generated via GANs on Deep Learning Classifiers.

作者信息

Peppes Nikolaos, Alexakis Theodoros, Adamopoulou Evgenia, Demestichas Konstantinos

机构信息

School of Electrical and Computer Engineering, National Technical University of Athens, 15773 Athens, Greece.

Department of Agricultural Economy and Development, Agricultural University of Athens, 15855 Athens, Greece.

出版信息

Sensors (Basel). 2023 Jan 12;23(2):900. doi: 10.3390/s23020900.

DOI:10.3390/s23020900
PMID:36679705
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9865087/
Abstract

Digitization of most of the services that people use in their everyday life has, among others, led to increased needs for cybersecurity. As digital tools increase day by day and new software and hardware launch out-of-the box, detection of known existing vulnerabilities, or zero-day as they are commonly known, becomes one of the most challenging situations for cybersecurity experts. Zero-day vulnerabilities, which can be found in almost every new launched software and/or hardware, can be exploited instantly by malicious actors with different motives, posing threats for end-users. In this context, this study proposes and describes a holistic methodology starting from the generation of zero-day-type, yet realistic, data in tabular format and concluding to the evaluation of a Neural Network zero-day attacks' detector which is trained with and without synthetic data. This methodology involves the design and employment of Generative Adversarial Networks (GANs) for synthetically generating a new and larger dataset of zero-day attacks data. The newly generated, by the Zero-Day GAN (ZDGAN), dataset is then used to train and evaluate a Neural Network classifier for zero-day attacks. The results show that the generation of zero-day attacks data in tabular format reaches an equilibrium after about 5000 iterations and produces data that are almost identical to the original data samples. Last but not least, it should be mentioned that the Neural Network model that was trained with the dataset containing the ZDGAN generated samples outperformed the same model when the later was trained with only the original dataset and achieved results of high validation accuracy and minimal validation loss.

摘要

人们在日常生活中使用的大多数服务的数字化,除其他外,导致了对网络安全的需求增加。随着数字工具日益增多,新的软件和硬件不断开箱即用,检测已知的现有漏洞,即通常所说的零日漏洞,成为网络安全专家面临的最具挑战性的情况之一。零日漏洞几乎可以在每一个新推出的软件和/或硬件中找到,怀有不同动机的恶意行为者可以立即利用这些漏洞,对终端用户构成威胁。在此背景下,本研究提出并描述了一种整体方法,该方法从生成表格格式的零日类型但逼真的数据开始,到评估一个使用和不使用合成数据进行训练的神经网络零日攻击检测器。该方法涉及设计和应用生成对抗网络(GAN)来合成生成一个新的、更大的零日攻击数据数据集。然后,由零日GAN(ZDGAN)新生成的数据集用于训练和评估一个用于零日攻击的神经网络分类器。结果表明,以表格格式生成零日攻击数据在大约5000次迭代后达到平衡,并生成与原始数据样本几乎相同的数据。最后但同样重要的是,应该提到的是,使用包含ZDGAN生成样本的数据集进行训练的神经网络模型,在仅使用原始数据集进行训练时,其性能优于相同模型,并取得了高验证准确率和最小验证损失的结果。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/5fbd51b90301/sensors-23-00900-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/cc72eeb0f40f/sensors-23-00900-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/2d2392d442ae/sensors-23-00900-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/58c8555f115d/sensors-23-00900-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/3e6f8af9fc20/sensors-23-00900-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/fce2ccc7f7fa/sensors-23-00900-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/85843bb2c7ee/sensors-23-00900-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/1daf27502a51/sensors-23-00900-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/b0a39b9dd30d/sensors-23-00900-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/8c432780858f/sensors-23-00900-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/5fbd51b90301/sensors-23-00900-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/cc72eeb0f40f/sensors-23-00900-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/2d2392d442ae/sensors-23-00900-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/58c8555f115d/sensors-23-00900-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/3e6f8af9fc20/sensors-23-00900-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/fce2ccc7f7fa/sensors-23-00900-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/85843bb2c7ee/sensors-23-00900-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/1daf27502a51/sensors-23-00900-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/b0a39b9dd30d/sensors-23-00900-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/8c432780858f/sensors-23-00900-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a95/9865087/5fbd51b90301/sensors-23-00900-g010.jpg

相似文献

1
The Effectiveness of Zero-Day Attacks Data Samples Generated via GANs on Deep Learning Classifiers.通过生成对抗网络(GANs)生成的零日攻击数据样本对深度学习分类器的有效性。
Sensors (Basel). 2023 Jan 12;23(2):900. doi: 10.3390/s23020900.
2
DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems.DReLAB - 深度强化学习对抗僵尸网络:一个用于针对僵尸网络入侵检测系统进行对抗攻击的基准数据集。
Data Brief. 2020 Dec 8;34:106631. doi: 10.1016/j.dib.2020.106631. eCollection 2021 Feb.
3
Generative adversarial network based synthetic data training model for lightweight convolutional neural networks.用于轻量级卷积神经网络的基于生成对抗网络的合成数据训练模型。
Multimed Tools Appl. 2023 May 20:1-23. doi: 10.1007/s11042-023-15747-6.
4
Tunable Privacy Risk Evaluation of Generative Adversarial Networks.生成式对抗网络的可调隐私风险评估。
Stud Health Technol Inform. 2024 Aug 22;316:1233-1237. doi: 10.3233/SHTI240634.
5
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.基于条件表格生成对抗的物联网网络 DDoS 和 DOS 攻击入侵检测系统。
Sensors (Basel). 2023 Jun 16;23(12):5644. doi: 10.3390/s23125644.
6
A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions.基于机器学习的零日攻击检测综述:挑战与未来方向
Comput Commun. 2023 Jan;198. doi: 10.1016/j.comcom.2022.11.001.
7
An intelligent zero trust secure framework for software defined networking.一种用于软件定义网络的智能零信任安全框架。
PeerJ Comput Sci. 2023 Nov 17;9:e1674. doi: 10.7717/peerj-cs.1674. eCollection 2023.
8
Enhancing classification of cells procured from bone marrow aspirate smears using generative adversarial networks and sequential convolutional neural network.利用生成对抗网络和序列卷积神经网络增强骨髓穿刺涂片获取的细胞分类。
Comput Methods Programs Biomed. 2022 Sep;224:107019. doi: 10.1016/j.cmpb.2022.107019. Epub 2022 Jul 10.
9
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).捍卫防御者:基于对抗学习的防御策略,用于网络物理系统 (CPS) 中的基于学习的安全方法。
Sensors (Basel). 2023 Jun 9;23(12):5459. doi: 10.3390/s23125459.
10
Synthetic Tabular Data Based on Generative Adversarial Networks in Health Care: Generation and Validation Using the Divide-and-Conquer Strategy.基于生成对抗网络的医疗保健合成表格数据:采用分治策略进行生成与验证
JMIR Med Inform. 2023 Nov 24;11:e47859. doi: 10.2196/47859.