A REVIEW OF GENERATIVE ADVERSARIAL NETWORKS FOR SECURITY APPLICATIONS
Swarajya Madhuri Rayavarapu
madhurirayavarapu.rs@andhrauniversity.edu.inAndhra University, Department of Electronics and Communication Engineering (India)
https://orcid.org/0009-0007-7559-2142
Shanmukha Prasanthi Tammineni
Andhra University, Department of Electronics and Communication Engineering (India)
https://orcid.org/0009-0000-5352-2265
Sasibhushana Rao Gottapu
Andhra University, Department of Electronics and Communication Engineering (India)
Aruna Singam
Andhra University, Department of Electronics and Communication Engineering (India)
Abstract
Advances in cybersecurity are crucial for a country's economic and national security. As data transmission and storage exponentially increase, new threat detection and mitigation techniques are urgently needed. Cybersecurity has become an absolute necessity, with the ever-increasing transmitted networks from day to day causing exponential growth of data that is being stored on servers. In order to thwart sophisticated attacks in the future, it will be necessary to regularly update threat detection and data preservation techniques. Generative adversarial networks (GANs) are a class of unsupervised machine learning models that can generate synthetic data. GANs are gaining importance in AI-based cybersecurity systems for applications such as intrusion detection, steganography, cryptography, and anomaly detection. This paper provides a comprehensive review of research on applying GANs for cybersecurity, including an analysis of popular cybersecurity datasets and GAN model architectures used in these studies.
Keywords:
generative models, cyber security, machine learning, neural networks, unsupervised learningReferences
Abadi M., Andersen D. G..: Learning to Protect Communications with Adversarial Neural Cryptography. 2016 [http://arxiv.org/abs/1610.06918].
Google Scholar
Araba Vander–Pallen M. et al.: Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 Onwards. IEEE World AI IoT Congress – AIIoT, 2022, 01–07 [https://doi.org/10.1109/AIIoT54504.2022.9817246].
Google Scholar
Creech G., Hu J.: A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns. IEEE Transactions on Computers 63(4), 2014, 807–819 [https://doi.org/10.1109/TC.2013.13].
Google Scholar
Creech G., Hu J.: Generation of a New IDS Test Dataset: Time to Retire the KDD Collection. IEEE Wireless Communications and Networking Conference – WCNC, 2013 [https://doi.org/10.1109/wcnc.2013.6555301].
Google Scholar
Creech G.: Developing a High-Accuracy Cross Platform Host-Based Intrusion Detection System Capable of Reliably Detecting Zero-Day Attacks. 2014.
Google Scholar
Dash A. et al.: A Review of Generative Adversarial Networks (GANs) and Its Applications in a Wide Variety of Disciplines - From Medical to Remote Sensing, 2021 [http://arxiv.org/abs/2110.01442].
Google Scholar
Deng Li.: The MNIST Database of Handwritten Digit Images for Machine Learning Research [Best of the Web]. IEEE Signal Processing Magazine 29(6), 2012, 141–142 [https://doi.org/10.1109/MSP.2012.2211477].
Google Scholar
Gomez A. N. et al.: Unsupervised Cipher Cracking Using Discrete GANs, 2018 [http://arxiv.org/abs/1801.04883].
Google Scholar
Goodfellow I. J. et al.: Generative Adversarial Networks. arXiv [Stat.ML], 2014 [http://arxiv.org/abs/1406.2661].
Google Scholar
Hitaj B. et al.: PassGAN: A Deep Learning Approach for Password Guessing. ACNS. 2019.
Google Scholar
Khelifi L., Mignotte M.: Deep Learning for Change Detection in Remote Sensing Images: Comprehensive Review and Meta-Analysis. IEEE Access 8, 2020, 126385–126400 [https://doi.org/10.1109/ACCESS.2020.3008036].
Google Scholar
Kumar S. et al.: Research Trends in Network-Based Intrusion Detection Systems: A Review. IEEE Access 9, 2021, 157761–157779 [https://doi.org/10.1109/ACCESS.2021.3129775].
Google Scholar
Learned-Miller G. B. H. E.: Labeled Faces in the Wild: Updates and New Reporting Procedures. University of Massachusetts. 2014.
Google Scholar
Lin Z. et al.: IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection. Lecture Notes in Computer Science, Springer International Publishing, 2022, 79–91 [https://doi.org/10.1007/978-3-031-05981-0_7].
Google Scholar
Liu Z. et al.: Deep Learning Face Attributes in the Wild. IEEE International Conference on Computer Vision – ICCV, IEEE, 2015 [https://doi.org/10.1109/iccv.2015.425].
Google Scholar
Moustafa N., Slay J.: The Evaluation of Network Anomaly Detection Systems: Statistical Analysis of the UNSW-NB15 Data Set and the Comparison with the KDD99 Data Set. Information Security Journal A Global Perspective 25(1–3), 2016, 18–31 [https://doi.org/10.1080/19393555.2015.1125974].
Google Scholar
Nam S. et al.: Recurrent GANs Password Cracker for IoT Password Security Enhancement. Sensors (Basel, Switzerland) 20(11), 3106 [https://doi.org/10.3390/s20113106].
Google Scholar
Odena A. et al.: Conditional Image Synthesis With Auxiliary Classifier GANs. 2016 [https://doi.org/10.48550].
Google Scholar
Radford A. et al.: Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. 2016 [http://arxiv.org/abs/1511.06434].
Google Scholar
Schlegl Th. et al.: Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery. 2017 [http://arxiv.org/abs/1703.05921].
Google Scholar
Sharafaldin I. et al.: Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. 4th International Conference on Information Systems Security and Privacy (ICISSP), 2018.
Google Scholar
Shen Y. et al.: Gan-Based Garment Generation Using Sewing Pattern Images. European Conference on Computer Vision, Springer, 225–247.
Google Scholar
Subramanian, N. et al.: Image Steganography: A Review of the Recent Advances. IEEE Access: Practical Innovations, Open Solutions 9, Institute of Electrical and Electronics Engineers (IEEE), 2021, 23409–23423 [https://doi.org/10.1109/access.2021.3053998].
Google Scholar
Tavallaee, M. et al.: A Detailed Analysis of the KDD CUP 99 Data Set. IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, 2009 [https://doi.org/10.1109/cisda.2009.5356528].
Google Scholar
Tong K. et al.: Recent Advances in Small Object Detection Based on Deep Learning: A Review. Image and Vision Computing 97, 2020, 103910 [https://doi.org/10.1016/j.imavis.2020.103910].
Google Scholar
Volkhonskiy Denis et al.: Steganographic Generative Adversarial Networks. 2019 [http://arxiv.org/abs/1703.05502].
Google Scholar
Wu Ch. et al.: WGAN-E: A Generative Adversarial Networks for Facial Feature Security. Electronics 9(3), 2020, 486 [https://doi.org/10.3390/electronics9030486].
Google Scholar
Yang J. et al.: Spatial Image Steganography Based on Generative Adversarial Network, 2018 [http://arxiv.org/abs/1804.07939].
Google Scholar
Yang Y. et al.: GAN-Based Semi-Supervised Learning Approach for Clinical Decision Support in Health-IoT Platform. IEEE Access 7, 2019, 8048–8057 [https://doi.org/10.1109/ACCESS.2018.2888816].
Google Scholar
Zenati H. et al.: Efficient GAN-Based Anomaly Detection. 2019. [http://arxiv.org/abs/1802.06222].
Google Scholar
Zheng W. et al.: GAN-Based Key Secret-Sharing Scheme in Blockchain. IEEE Transactions on Cybernetics 51(1), 2021, 393–404 [https://doi.org/10.1109/TCYB.2019.2963138].
Google Scholar
Zhu J. Y. et al. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks, 2017 [https://doi.org/10.48550/ARXIV.1703.10593].
Google Scholar
Authors
Swarajya Madhuri Rayavarapumadhurirayavarapu.rs@andhrauniversity.edu.in
Andhra University, Department of Electronics and Communication Engineering India
https://orcid.org/0009-0007-7559-2142
Authors
Shanmukha Prasanthi TammineniAndhra University, Department of Electronics and Communication Engineering India
https://orcid.org/0009-0000-5352-2265
Authors
Sasibhushana Rao GottapuAndhra University, Department of Electronics and Communication Engineering India
Authors
Aruna SingamAndhra University, Department of Electronics and Communication Engineering India
Statistics
Abstract views: 170PDF downloads: 107
Most read articles by the same author(s)
- Swarajya Madhuri Rayavarapu, Tammineni Shanmukha Prasanthi, Gottapu Santosh Kumar, Gottapu Sasibhushana Rao, Gottapu Prashanti, A GENERATIVE MODEL FOR DEEP FAKE AUGMENTATION OF PHONOCARDIOGRAM AND ELECTROCARDIOGRAM SIGNALS USING LSGAN AND CYCLE GAN , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 13 No. 4 (2023)
- Shanmukhaprasanthi Tammineni, Swaraiya Madhuri Rayavarapu, Sasibhushana Rao Gottapu, Raj Kumar Goswami, DIGITAL IMAGE RESTORATION USING SURF ALGORITHM , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 1 (2024)