A Comparison Study of Generative Adversarial Network Architectures for Malicious Cyber-Attack Data Generation

نویسندگان

چکیده

The digitization trend that prevails nowadays has led to increased vulnerabilities of tools and technologies everyday life. One the many different types software attacks is botnets. Botnets enable attackers gain remote control infected machines, often leading disastrous consequences. Cybersecurity experts engage machine learning (ML) deep (DL) for designing developing smart proactive cybersecurity systems in order tackle such infections. development is, often, hindered by lack data can be used train them. Aiming address this problem, study proposes describes a methodology generation botnet-type tabular format. This involves design two generative adversarial network (GAN) models, one with six layers other eight layers, identify most efficient reliable terms similarity generated real ones. GAN models produce loops 25, 50, 100, 250, 500 1000 epochs. results are quite encouraging as, both between synthetic around 80%. eight-layer solution slightly better after running epochs, it achieved degree 82%, outperforming six-layer one, which 77%. These indicate solutions augmentation domain feasible lead new standards training trustworthy ML DL detecting tackling botnet attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improvement of generative adversarial networks for automatic text-to-image generation

This research is related to the use of deep learning tools and image processing technology in the automatic generation of images from text. Previous researches have used one sentence to produce images. In this research, a memory-based hierarchical model is presented that uses three different descriptions that are presented in the form of sentences to produce and improve the image. The proposed ...

متن کامل

Adversarial Examples Generation and Defense Based on Generative Adversarial Network

We propose a novel generative adversarial network to generate and defend adversarial examples for deep neural networks (DNN). The adversarial stability of a network D is improved by training alternatively with an additional network G. Our experiment is carried out on MNIST, and the adversarial examples are generated in an efficient way compared with wildly-used gradient based methods. After tra...

متن کامل

network of phonological rules in lori dialect of andimeshk: a study within the framework of post-generative approach.

پژوهش حاضر ارائه ی توصیفی است از نظام آوایی گویش لری شهر اندیمشک، واقع در شمال غربی استان خوزستان. چهارچوب نظری این پژوهش، انگاره ی پسازایشی جزءمستقل می باشد. این پایان نامه شامل موارد زیر است: -توصیف آواهای این گویش به صورت آواشناسی سنتی و در قالب مختصه های زایشی ممیز، همراه با آوانوشته ی تفصیلی؛ -توصیف نظام آوایی گویش لری و قواعد واجی آن در چهارچوب انگاره ی پسازایشی جزءمستقل و معرفی برهم کن...

Wasserstein Generative Adversarial Network

Recent advances in deep generative models give us new perspective on modeling highdimensional, nonlinear data distributions. Especially the GAN training can successfully produce sharp, realistic images. However, GAN sidesteps the use of traditional maximum likelihood learning and instead adopts an two-player game approach. This new training behaves very differently compared to ML learning. Ther...

متن کامل

Controllable Generative Adversarial Network

Although it is recently introduced, in last few years, generative adversarial network (GAN) has been shown many promising results to generate realistic samples. However, it is hardly able to control generated samples since input variables for a generator are from a random distribution. Some attempts have been made to control generated samples from GAN, but they have shown moderate results. Furt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13127106