TY - GEN
T1 - An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets
AU - Xie, Huihui
AU - Lv, Kun
AU - Hu, Changzhen
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/9/5
Y1 - 2018/9/5
N2 - In practice, there are few available attack dataset. Although there are many methods that can be used to simulate cyberattacks for attack data, such as using specific tools, writing scripts to simulate the attack scenes, etc.. The disadvantages of those methods are also obvious. Tools developers and script authors need to know professional network security knowledge. As tools are implemented in different ways, users also need to have some expertise. What's more, it may take a long time to generate a large amount of attack data. In this paper, we present some of the existing network attack tools and proposed a method to generate attack data based on generative adversarial network. Using our method you do not need to have a professional network security knowledge, only use some basic network attack data one can generate a large number of attack data in a very short period of time. As network malicious activities become increasingly complex and diverse, network security analysts face serious challenges. Our method also can generate mixed features attack data by setting training data with different attack types. It has high performance. To test the performance of our method, we did a test and found that it took only 160 seconds to generate a million connection records in a PC with 3.7GHz, 4 core CPU and 8G memory.
AB - In practice, there are few available attack dataset. Although there are many methods that can be used to simulate cyberattacks for attack data, such as using specific tools, writing scripts to simulate the attack scenes, etc.. The disadvantages of those methods are also obvious. Tools developers and script authors need to know professional network security knowledge. As tools are implemented in different ways, users also need to have some expertise. What's more, it may take a long time to generate a large amount of attack data. In this paper, we present some of the existing network attack tools and proposed a method to generate attack data based on generative adversarial network. Using our method you do not need to have a professional network security knowledge, only use some basic network attack data one can generate a large number of attack data in a very short period of time. As network malicious activities become increasingly complex and diverse, network security analysts face serious challenges. Our method also can generate mixed features attack data by setting training data with different attack types. It has high performance. To test the performance of our method, we did a test and found that it took only 160 seconds to generate a million connection records in a PC with 3.7GHz, 4 core CPU and 8G memory.
KW - attack data
KW - generate attack data
KW - generative adversarial network
KW - simulated attack data
UR - http://www.scopus.com/inward/record.url?scp=85054103132&partnerID=8YFLogxK
U2 - 10.1109/TrustCom/BigDataSE.2018.00268
DO - 10.1109/TrustCom/BigDataSE.2018.00268
M3 - Conference contribution
AN - SCOPUS:85054103132
SN - 9781538643877
T3 - Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
SP - 1777
EP - 1784
BT - Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
Y2 - 31 July 2018 through 3 August 2018
ER -