4.7 Article

GAN augmentation to deal with imbalance in imaging-based intrusion detection

出版社

ELSEVIER
DOI: 10.1016/j.future.2021.04.017

关键词

Intrusion detection; Deep learning; Data augmentation; Image encoding

资金

  1. MIURMinistero dell'Istruzione dell'Universita e della Ricerca [ARS01_01116]
  2. University of Bari Aldo Moro

向作者/读者索取更多资源

This paper presents a deep learning methodology for binary classification of network traffic by representing network flows as 2D images and using Generative Adversarial Networks (GAN) and Convolutional Neural Networks (CNN). The GAN is trained to generate new images of unforeseen network attacks to augment training data for a CNN-based intrusion detection model, leading to better predictive accuracy.
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders' ability to write new attack signatures. This paper illustrates a deep learning methodology for the binary classification of the network traffic. The basic idea is to represent network flows as 2D images and use this imagery representation of the network traffic to train a Generative Adversarial Network (GAN) and a Convolutional Neural Network (CNN). The GAN is trained to produce new images of unforeseen network attacks by augmenting the training data used to learn a CNN-based intrusion detection model. The advantage is that the 2D data mapping technique used builds images of the network flows, which allow us to take advantage of deep learning architectures with convolution layers. In addition, the GAN-based data augmentation allows us to deal with the possible imbalance of malicious traffic that is commonly rarer than the normal traffic in the network traffic. Specifically, it is used to simulate unforeseen attacks to train a robust intrusion detection model. The proposed methodology leads to better predictive accuracy when compared to competitive intrusion detection architectures on four benchmark datasets. (C) 2021 Published by Elsevier B.V.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据