2021
DOI: 10.48550/arxiv.2103.04794
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Packet-Level Adversarial Network Traffic Crafting using Sequence Generative Adversarial Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…Various researchers have employed GANs to synthesise the network traffic data to address the issue of data imbalance, and adversarial evasion attacks [3], [20], [21]. However, GANs are not good at generating categorical features [8]. Researchers have used one-hot representation [5], or IP2Vec techniques [22], [23] to transform IP addresses into integer values to input to GANs for data generation.…”
Section: F Semantics/functionality Preservationmentioning
confidence: 99%
See 2 more Smart Citations
“…Various researchers have employed GANs to synthesise the network traffic data to address the issue of data imbalance, and adversarial evasion attacks [3], [20], [21]. However, GANs are not good at generating categorical features [8]. Researchers have used one-hot representation [5], or IP2Vec techniques [22], [23] to transform IP addresses into integer values to input to GANs for data generation.…”
Section: F Semantics/functionality Preservationmentioning
confidence: 99%
“…At the same time, the malicious activity must not be compromised. For this reason, several researchers have proposed functionality preservation by modifying only the non-functionality preserving features using GANs [5], [7], [8]. However, various research works claim to preserve the malicious functionality of the generated samples using deep reinforcement learning.…”
Section: F Semantics/functionality Preservationmentioning
confidence: 99%
See 1 more Smart Citation
“…The accuracy rates for DT, CNN, and MLP classifiers under the CIFGSM attack dropped to 0.25, 0.68, and 0.73, respectively. Cheng et al [48] proposed Attack-GAN that crafts adversarial traffic at the packet level that maintains the domain constraints. The Attack-GAN utilizes Sequence Generative Adversarial Nets (SeqGAN) with policy gradient in which the generation of adversarial packets is constructed as a sequential decisionmaking process.…”
Section: A Generation Of Aes To Attack Ml-based Nids Modelsmentioning
confidence: 99%
“…So, GANs do not play a role in generating a complete feature vector in those works. It is also quite challenging to generate categorical features using a GAN without manual engineering except using a sequence GAN [9]. Researchers have also used deep reinforcement learning (DRL) to generate the functionality preserving adversarial evasion attacks [10][11][12].…”
Section: Introductionmentioning
confidence: 99%