A Comparison Study of Generative Adversarial Network Architectures for Malicious Cyber-Attack Data Generation
نویسندگان
چکیده
The digitization trend that prevails nowadays has led to increased vulnerabilities of tools and technologies everyday life. One the many different types software attacks is botnets. Botnets enable attackers gain remote control infected machines, often leading disastrous consequences. Cybersecurity experts engage machine learning (ML) deep (DL) for designing developing smart proactive cybersecurity systems in order tackle such infections. development is, often, hindered by lack data can be used train them. Aiming address this problem, study proposes describes a methodology generation botnet-type tabular format. This involves design two generative adversarial network (GAN) models, one with six layers other eight layers, identify most efficient reliable terms similarity generated real ones. GAN models produce loops 25, 50, 100, 250, 500 1000 epochs. results are quite encouraging as, both between synthetic around 80%. eight-layer solution slightly better after running epochs, it achieved degree 82%, outperforming six-layer one, which 77%. These indicate solutions augmentation domain feasible lead new standards training trustworthy ML DL detecting tackling botnet attacks.
منابع مشابه
Improvement of generative adversarial networks for automatic text-to-image generation
This research is related to the use of deep learning tools and image processing technology in the automatic generation of images from text. Previous researches have used one sentence to produce images. In this research, a memory-based hierarchical model is presented that uses three different descriptions that are presented in the form of sentences to produce and improve the image. The proposed ...
متن کاملAdversarial Examples Generation and Defense Based on Generative Adversarial Network
We propose a novel generative adversarial network to generate and defend adversarial examples for deep neural networks (DNN). The adversarial stability of a network D is improved by training alternatively with an additional network G. Our experiment is carried out on MNIST, and the adversarial examples are generated in an efficient way compared with wildly-used gradient based methods. After tra...
متن کاملnetwork of phonological rules in lori dialect of andimeshk: a study within the framework of post-generative approach.
پژوهش حاضر ارائه ی توصیفی است از نظام آوایی گویش لری شهر اندیمشک، واقع در شمال غربی استان خوزستان. چهارچوب نظری این پژوهش، انگاره ی پسازایشی جزءمستقل می باشد. این پایان نامه شامل موارد زیر است: -توصیف آواهای این گویش به صورت آواشناسی سنتی و در قالب مختصه های زایشی ممیز، همراه با آوانوشته ی تفصیلی؛ -توصیف نظام آوایی گویش لری و قواعد واجی آن در چهارچوب انگاره ی پسازایشی جزءمستقل و معرفی برهم کن...
Wasserstein Generative Adversarial Network
Recent advances in deep generative models give us new perspective on modeling highdimensional, nonlinear data distributions. Especially the GAN training can successfully produce sharp, realistic images. However, GAN sidesteps the use of traditional maximum likelihood learning and instead adopts an two-player game approach. This new training behaves very differently compared to ML learning. Ther...
متن کاملControllable Generative Adversarial Network
Although it is recently introduced, in last few years, generative adversarial network (GAN) has been shown many promising results to generate realistic samples. However, it is hardly able to control generated samples since input variables for a generator are from a random distribution. Some attempts have been made to control generated samples from GAN, but they have shown moderate results. Furt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13127106