A REVIEW OF GENERATIVE ADVERSARIAL NETWORKS FOR SECURITY APPLICATIONS
Article Sidebar
Open full text
Issue Vol. 14 No. 2 (2024)
-
HAND MOVEMENT DISORDERS TRACKING BY SMARTPHONE BASED ON COMPUTER VISION METHODS
Marko Andrushchenko, Karina Selivanova, Oleg Avrunin, Dmytro Palii, Sergii Tymchyk , Dana Turlykozhayeva5-10
-
MEANS OF ANALYZING PARAMETERS OF SPEECH SIGNAL TRANSMISSION AND REPRODUCTION
Olexiy Azarov, Larysa Azarova, Iurii Krak, Leonid Krupelnitskyi, Anzhelika Azarova, Veronika Azarova11-16
-
CONCEPT AND VALIDATION OF A SYSTEM FOR RECORDING VIBROACOUSTIC SIGNALS OF THE KNEE JOINT
Robert Karpiński, Anna Machrowska, Marcin Maciejewski, Józef Jonak, Przemysław Krakowski17-21
-
A COYOTE-INSPIRED APPROACH FOR SYSTEMIC LUPUS ERYTHEMATOSUS PREDICTION USING NEURAL NETWORKS
Sobhana Mummaneni, Pragathi Dodda, Naga Deepika Ginjupalli22-27
-
CHANGE OF FREQUENCY CHARACTERISTICS OF A FILTER USING A REACTOR WITH SMOOTHLY ADJUSTABLE INDUCTANCE
Vasyl Hudym, Vira Kosovska, Huthaifa Al_Issa, Taras Shchur, Oleksandr Miroshnyk, Sławomir Ziarkowski28-33
-
STUDY OF STARTING MODES OF SINGLE-PHASE INDUCTION MOTORS WHEN CHANGING THE PARAMETERS OF THE STATOR WINDINGS, PHASE-SHIFTING CAPACITOR AND SUPPLY VOLTAGE
Suad Omar Aldaikh, Mohannad O. Rawashdeh, Lina H. Hussienat, Mohamed Qawaqzeh, Oleksiy Iegorov, Olga Iegorova, Mykola Kundenko, Dmytro Danylchenko, Oleksandr Miroshnyk, Taras Shchur34-41
-
EVALUATION OF THE ENERGY CHARACTERISTICS OF THE INFRARED DRYING PROCESS OF RAPESEED AND SOYBEANS WITH A VIBRATING WAVE DRIVER
Igor Palamarchuk, Vladyslav Palamarchuk, Marija Zheplinska42-46
-
JUSTIFICATION OF THE POSSIBILITY OF BUILDING AN INTEGRATED ULTRASONIC MEASURING TRANSDUCER OF NATURAL GAS CONSUMPTION
Yosyp Bilynsky, Аndrii Stetsenko, Konstantin Ogorodnik47-50
-
NUMERICAL STUDY OF THE POSSIBILITY OF USING ADHESIVE JOINTS FOR INDIRECT MEASUREMENTS FOR STRESS DISTRIBUTION
Piotr Kisała, Paweł Wiśniewski51-55
-
A MODIFIED METHOD OF SPECTRAL ANALYSIS OF RADIO SIGNALS USING THE OPERATOR APPROACH FOR THE FOURIER TRANSFORM
Valentyn Sobchuk, Serhii Laptiev, Tetiana Laptievа, Oleg Barabash, Oleksandr Drobyk, Andrii Sobchuk56-61
-
ITERATIVE DECODING OF SHORT LOW-DENSITY PARITY-CHECK CODES BASED ON DIFFERENTIAL EVOLUTION
Mykola Shtompel, Sergii Prykhodko62-65
-
A REVIEW OF GENERATIVE ADVERSARIAL NETWORKS FOR SECURITY APPLICATIONS
Swarajya Madhuri Rayavarapu, Shanmukha Prasanthi Tammineni, Sasibhushana Rao Gottapu, Aruna Singam66-70
-
IoT FOR PREDICTIVE MAINTENANCE OF CRITICAL MEDICAL EQUIPMENT IN A HOSPITAL STRUCTURE
Maroua Guissi, My Hachem El Yousfi Alaoui, Larbi Belarbi, Asma Chaik71-76
-
APPLICATION OF RESNET-152 NEURAL NETWORKS TO ANALYZE IMAGES FROM UAV FOR FIRE DETECTION
Nataliia Stelmakh, Svitlana Mandrovska, Roman Galagan77-82
-
IDENTIFICATION OF SALT-AFFECTED SOILS IN THE COASTAL AREA OF KRISHNA DISTRICT, ANDHRA PRADESH, USING REMOTE SENSING DATA AND MACHINE LEARNING TECHNIQUES
Govada Anuradha, Venkata Sai Sankara Vineeth Chivukula, Naga Ganesh Kothangundla83-88
-
PERFORMANCE EVALUATION FOR FACE MASK DETECTION BASED ON MULT MODIFICATION OF YOLOV8 ARCHITECTURE
Muna AL-Shamdeen, Fawziya Mahmood Ramo89-95
-
EVALUATION OF ENGINEERING SOLUTIONS IN THE DEVELOPMENT OF THE PROCUREMENT SECTION FOR THE METAL CONSTRUCTION WORKSHOP
Bogdan Palchevskyi, Lubov Krestyanpol96-100
-
EVALUATING THE PERFORMANCE OF BITCOIN PRICE FORECASTING USING MACHINE LEARNING TECHNIQUES ON HISTORICAL DATA
Mamun Ahmed, Sayma Alam Suha, Fahamida Hossain Mahi, Forhad Uddin Ahmed101-108
-
METHODS OF INTELLIGENT DATA ANALYSIS USING NEURAL NETWORKS IN DIAGNOSIS
Volodymyr Lyfar, Olena Lyfar, Volodymyr Zynchenko109-112
-
IMPROVING PARAMETERS OF V-SUPPORT VECTOR REGRESSION WITH FEATURE SELECTION IN PARALLEL BY USING QUASI-OPPOSITIONAL AND HARRIS HAWKS OPTIMIZATION ALGORITHM
Omar Mohammed Ismael, Omar Saber Qasim, Zakariya Yahya Algamal113-118
-
AN ADAPTIVE DIFFERENTIAL EVOLUTION ALGORITHM WITH A BOUND ADJUSTMENT STRATEGY FOR SOLVING NONLINEAR PARAMETER IDENTIFICATION PROBLEMS
Watchara Wongsa, Pikul Puphasuk, Jeerayut Wetweerapong119-126
-
MODELING THE CHOICE OF AN ONLINE COURSE FOR INFORMATION HYGIENE SKILLS USING THE SAATY METHOD
Yuliia Rudenko, Karen Ahadzhanov-Honsales, Svitlana Ahadzhanova, Alla Batalova, Olena Bieliaieva, Artem Yurchenko, Olena Semenikhina127-132
-
REVIEW OF THE ACHIEVEMENTS OF EMPLOYEES OF THE LUBLIN UNIVERSITY OF TECHNOLOGY IN THE FIELD OF FUZZY SET UTILIZATION
Maciej Celiński, Adam Kiersztyn133-140
-
MODELING ROBOTECHNICAL MECHATRONIC COMPLEXES IN V-REP PROGRAM
Laura Yesmakhanova141-148
Archives
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
Main Article Content
DOI
Authors
madhurirayavarapu.rs@andhrauniversity.edu.in
prashanthitammineni.rs@andhrauniversity.edu.in
Abstract
Advances in cybersecurity are crucial for a country's economic and national security. As data transmission and storage exponentially increase, new threat detection and mitigation techniques are urgently needed. Cybersecurity has become an absolute necessity, with the ever-increasing transmitted networks from day to day causing exponential growth of data that is being stored on servers. In order to thwart sophisticated attacks in the future, it will be necessary to regularly update threat detection and data preservation techniques. Generative adversarial networks (GANs) are a class of unsupervised machine learning models that can generate synthetic data. GANs are gaining importance in AI-based cybersecurity systems for applications such as intrusion detection, steganography, cryptography, and anomaly detection. This paper provides a comprehensive review of research on applying GANs for cybersecurity, including an analysis of popular cybersecurity datasets and GAN model architectures used in these studies.
Keywords:
References
Abadi M., Andersen D. G..: Learning to Protect Communications with Adversarial Neural Cryptography. 2016 [http://arxiv.org/abs/1610.06918].
Araba Vander–Pallen M. et al.: Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 Onwards. IEEE World AI IoT Congress – AIIoT, 2022, 01–07 [https://doi.org/10.1109/AIIoT54504.2022.9817246]. DOI: https://doi.org/10.1109/AIIoT54504.2022.9817246
Creech G., Hu J.: A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns. IEEE Transactions on Computers 63(4), 2014, 807–819 [https://doi.org/10.1109/TC.2013.13]. DOI: https://doi.org/10.1109/TC.2013.13
Creech G., Hu J.: Generation of a New IDS Test Dataset: Time to Retire the KDD Collection. IEEE Wireless Communications and Networking Conference – WCNC, 2013 [https://doi.org/10.1109/wcnc.2013.6555301]. DOI: https://doi.org/10.1109/WCNC.2013.6555301
Creech G.: Developing a High-Accuracy Cross Platform Host-Based Intrusion Detection System Capable of Reliably Detecting Zero-Day Attacks. 2014.
Dash A. et al.: A Review of Generative Adversarial Networks (GANs) and Its Applications in a Wide Variety of Disciplines - From Medical to Remote Sensing, 2021 [http://arxiv.org/abs/2110.01442].
Deng Li.: The MNIST Database of Handwritten Digit Images for Machine Learning Research [Best of the Web]. IEEE Signal Processing Magazine 29(6), 2012, 141–142 [https://doi.org/10.1109/MSP.2012.2211477]. DOI: https://doi.org/10.1109/MSP.2012.2211477
Gomez A. N. et al.: Unsupervised Cipher Cracking Using Discrete GANs, 2018 [http://arxiv.org/abs/1801.04883].
Goodfellow I. J. et al.: Generative Adversarial Networks. arXiv [Stat.ML], 2014 [http://arxiv.org/abs/1406.2661].
Hitaj B. et al.: PassGAN: A Deep Learning Approach for Password Guessing. ACNS. 2019. DOI: https://doi.org/10.1007/978-3-030-21568-2_11
Khelifi L., Mignotte M.: Deep Learning for Change Detection in Remote Sensing Images: Comprehensive Review and Meta-Analysis. IEEE Access 8, 2020, 126385–126400 [https://doi.org/10.1109/ACCESS.2020.3008036]. DOI: https://doi.org/10.1109/ACCESS.2020.3008036
Kumar S. et al.: Research Trends in Network-Based Intrusion Detection Systems: A Review. IEEE Access 9, 2021, 157761–157779 [https://doi.org/10.1109/ACCESS.2021.3129775]. DOI: https://doi.org/10.1109/ACCESS.2021.3129775
Learned-Miller G. B. H. E.: Labeled Faces in the Wild: Updates and New Reporting Procedures. University of Massachusetts. 2014.
Lin Z. et al.: IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection. Lecture Notes in Computer Science, Springer International Publishing, 2022, 79–91 [https://doi.org/10.1007/978-3-031-05981-0_7]. DOI: https://doi.org/10.1007/978-3-031-05981-0_7
Liu Z. et al.: Deep Learning Face Attributes in the Wild. IEEE International Conference on Computer Vision – ICCV, IEEE, 2015 [https://doi.org/10.1109/iccv.2015.425]. DOI: https://doi.org/10.1109/ICCV.2015.425
Moustafa N., Slay J.: The Evaluation of Network Anomaly Detection Systems: Statistical Analysis of the UNSW-NB15 Data Set and the Comparison with the KDD99 Data Set. Information Security Journal A Global Perspective 25(1–3), 2016, 18–31 [https://doi.org/10.1080/19393555.2015.1125974]. DOI: https://doi.org/10.1080/19393555.2015.1125974
Nam S. et al.: Recurrent GANs Password Cracker for IoT Password Security Enhancement. Sensors (Basel, Switzerland) 20(11), 3106 [https://doi.org/10.3390/s20113106]. DOI: https://doi.org/10.3390/s20113106
Odena A. et al.: Conditional Image Synthesis With Auxiliary Classifier GANs. 2016 [https://doi.org/10.48550].
Radford A. et al.: Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. 2016 [http://arxiv.org/abs/1511.06434].
Schlegl Th. et al.: Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery. 2017 [http://arxiv.org/abs/1703.05921]. DOI: https://doi.org/10.1007/978-3-319-59050-9_12
Sharafaldin I. et al.: Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. 4th International Conference on Information Systems Security and Privacy (ICISSP), 2018. DOI: https://doi.org/10.5220/0006639801080116
Shen Y. et al.: Gan-Based Garment Generation Using Sewing Pattern Images. European Conference on Computer Vision, Springer, 225–247. DOI: https://doi.org/10.1007/978-3-030-58523-5_14
Subramanian, N. et al.: Image Steganography: A Review of the Recent Advances. IEEE Access: Practical Innovations, Open Solutions 9, Institute of Electrical and Electronics Engineers (IEEE), 2021, 23409–23423 [https://doi.org/10.1109/access.2021.3053998]. DOI: https://doi.org/10.1109/ACCESS.2021.3053998
Tavallaee, M. et al.: A Detailed Analysis of the KDD CUP 99 Data Set. IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, 2009 [https://doi.org/10.1109/cisda.2009.5356528]. DOI: https://doi.org/10.1109/CISDA.2009.5356528
Tong K. et al.: Recent Advances in Small Object Detection Based on Deep Learning: A Review. Image and Vision Computing 97, 2020, 103910 [https://doi.org/10.1016/j.imavis.2020.103910]. DOI: https://doi.org/10.1016/j.imavis.2020.103910
Volkhonskiy Denis et al.: Steganographic Generative Adversarial Networks. 2019 [http://arxiv.org/abs/1703.05502].
Wu Ch. et al.: WGAN-E: A Generative Adversarial Networks for Facial Feature Security. Electronics 9(3), 2020, 486 [https://doi.org/10.3390/electronics9030486]. DOI: https://doi.org/10.3390/electronics9030486
Yang J. et al.: Spatial Image Steganography Based on Generative Adversarial Network, 2018 [http://arxiv.org/abs/1804.07939].
Yang Y. et al.: GAN-Based Semi-Supervised Learning Approach for Clinical Decision Support in Health-IoT Platform. IEEE Access 7, 2019, 8048–8057 [https://doi.org/10.1109/ACCESS.2018.2888816]. DOI: https://doi.org/10.1109/ACCESS.2018.2888816
Zenati H. et al.: Efficient GAN-Based Anomaly Detection. 2019. [http://arxiv.org/abs/1802.06222].
Zheng W. et al.: GAN-Based Key Secret-Sharing Scheme in Blockchain. IEEE Transactions on Cybernetics 51(1), 2021, 393–404 [https://doi.org/10.1109/TCYB.2019.2963138]. DOI: https://doi.org/10.1109/TCYB.2019.2963138
Zhu J. Y. et al. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks, 2017 [https://doi.org/10.48550/ARXIV.1703.10593]. DOI: https://doi.org/10.1109/ICCV.2017.244
Article Details
Abstract views: 655

