A REVIEW OF GENERATIVE ADVERSARIAL NETWORKS FOR SECURITY APPLICATIONS

Swarajya Madhuri Rayavarapu

madhurirayavarapu.rs@andhrauniversity.edu.in
Andhra University, Department of Electronics and Communication Engineering (India)
https://orcid.org/0009-0007-7559-2142

Shanmukha Prasanthi Tammineni


Andhra University, Department of Electronics and Communication Engineering (India)
https://orcid.org/0009-0000-5352-2265

Sasibhushana Rao Gottapu


Andhra University, Department of Electronics and Communication Engineering (India)

Aruna Singam


Andhra University, Department of Electronics and Communication Engineering (India)

Abstract

Advances in cybersecurity are crucial for a country's economic and national security. As data transmission and storage exponentially increase, new threat detection and mitigation techniques are urgently needed. Cybersecurity has become an absolute necessity, with the ever-increasing transmitted networks from day to day causing exponential growth of data that is being stored on servers. In order to thwart sophisticated attacks in the future, it will be necessary to regularly update threat detection and data preservation techniques. Generative adversarial networks (GANs) are a class of unsupervised machine learning models that can generate synthetic data. GANs are gaining importance in AI-based cybersecurity systems for applications such as intrusion detection, steganography, cryptography, and anomaly detection. This paper provides a comprehensive review of research on applying GANs for cybersecurity, including an analysis of popular cybersecurity datasets and GAN model architectures used in these studies.


Keywords:

generative models, cyber security, machine learning, neural networks, unsupervised learning

Abadi M., Andersen D. G..: Learning to Protect Communications with Adversarial Neural Cryptography. 2016 [http://arxiv.org/abs/1610.06918].
  Google Scholar

Araba Vander–Pallen M. et al.: Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 Onwards. IEEE World AI IoT Congress – AIIoT, 2022, 01–07 [https://doi.org/10.1109/AIIoT54504.2022.9817246].
DOI: https://doi.org/10.1109/AIIoT54504.2022.9817246   Google Scholar

Creech G., Hu J.: A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns. IEEE Transactions on Computers 63(4), 2014, 807–819 [https://doi.org/10.1109/TC.2013.13].
DOI: https://doi.org/10.1109/TC.2013.13   Google Scholar

Creech G., Hu J.: Generation of a New IDS Test Dataset: Time to Retire the KDD Collection. IEEE Wireless Communications and Networking Conference – WCNC, 2013 [https://doi.org/10.1109/wcnc.2013.6555301].
DOI: https://doi.org/10.1109/WCNC.2013.6555301   Google Scholar

Creech G.: Developing a High-Accuracy Cross Platform Host-Based Intrusion Detection System Capable of Reliably Detecting Zero-Day Attacks. 2014.
  Google Scholar

Dash A. et al.: A Review of Generative Adversarial Networks (GANs) and Its Applications in a Wide Variety of Disciplines - From Medical to Remote Sensing, 2021 [http://arxiv.org/abs/2110.01442].
  Google Scholar

Deng Li.: The MNIST Database of Handwritten Digit Images for Machine Learning Research [Best of the Web]. IEEE Signal Processing Magazine 29(6), 2012, 141–142 [https://doi.org/10.1109/MSP.2012.2211477].
DOI: https://doi.org/10.1109/MSP.2012.2211477   Google Scholar

Gomez A. N. et al.: Unsupervised Cipher Cracking Using Discrete GANs, 2018 [http://arxiv.org/abs/1801.04883].
  Google Scholar

Goodfellow I. J. et al.: Generative Adversarial Networks. arXiv [Stat.ML], 2014 [http://arxiv.org/abs/1406.2661].
  Google Scholar

Hitaj B. et al.: PassGAN: A Deep Learning Approach for Password Guessing. ACNS. 2019.
DOI: https://doi.org/10.1007/978-3-030-21568-2_11   Google Scholar

Khelifi L., Mignotte M.: Deep Learning for Change Detection in Remote Sensing Images: Comprehensive Review and Meta-Analysis. IEEE Access 8, 2020, 126385–126400 [https://doi.org/10.1109/ACCESS.2020.3008036].
DOI: https://doi.org/10.1109/ACCESS.2020.3008036   Google Scholar

Kumar S. et al.: Research Trends in Network-Based Intrusion Detection Systems: A Review. IEEE Access 9, 2021, 157761–157779 [https://doi.org/10.1109/ACCESS.2021.3129775].
DOI: https://doi.org/10.1109/ACCESS.2021.3129775   Google Scholar

Learned-Miller G. B. H. E.: Labeled Faces in the Wild: Updates and New Reporting Procedures. University of Massachusetts. 2014.
  Google Scholar

Lin Z. et al.: IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection. Lecture Notes in Computer Science, Springer International Publishing, 2022, 79–91 [https://doi.org/10.1007/978-3-031-05981-0_7].
DOI: https://doi.org/10.1007/978-3-031-05981-0_7   Google Scholar

Liu Z. et al.: Deep Learning Face Attributes in the Wild. IEEE International Conference on Computer Vision – ICCV, IEEE, 2015 [https://doi.org/10.1109/iccv.2015.425].
DOI: https://doi.org/10.1109/ICCV.2015.425   Google Scholar

Moustafa N., Slay J.: The Evaluation of Network Anomaly Detection Systems: Statistical Analysis of the UNSW-NB15 Data Set and the Comparison with the KDD99 Data Set. Information Security Journal A Global Perspective 25(1–3), 2016, 18–31 [https://doi.org/10.1080/19393555.2015.1125974].
DOI: https://doi.org/10.1080/19393555.2015.1125974   Google Scholar

Nam S. et al.: Recurrent GANs Password Cracker for IoT Password Security Enhancement. Sensors (Basel, Switzerland) 20(11), 3106 [https://doi.org/10.3390/s20113106].
DOI: https://doi.org/10.3390/s20113106   Google Scholar

Odena A. et al.: Conditional Image Synthesis With Auxiliary Classifier GANs. 2016 [https://doi.org/10.48550].
  Google Scholar

Radford A. et al.: Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. 2016 [http://arxiv.org/abs/1511.06434].
  Google Scholar

Schlegl Th. et al.: Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery. 2017 [http://arxiv.org/abs/1703.05921].
DOI: https://doi.org/10.1007/978-3-319-59050-9_12   Google Scholar

Sharafaldin I. et al.: Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. 4th International Conference on Information Systems Security and Privacy (ICISSP), 2018.
DOI: https://doi.org/10.5220/0006639801080116   Google Scholar

Shen Y. et al.: Gan-Based Garment Generation Using Sewing Pattern Images. European Conference on Computer Vision, Springer, 225–247.
DOI: https://doi.org/10.1007/978-3-030-58523-5_14   Google Scholar

Subramanian, N. et al.: Image Steganography: A Review of the Recent Advances. IEEE Access: Practical Innovations, Open Solutions 9, Institute of Electrical and Electronics Engineers (IEEE), 2021, 23409–23423 [https://doi.org/10.1109/access.2021.3053998].
DOI: https://doi.org/10.1109/ACCESS.2021.3053998   Google Scholar

Tavallaee, M. et al.: A Detailed Analysis of the KDD CUP 99 Data Set. IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, 2009 [https://doi.org/10.1109/cisda.2009.5356528].
DOI: https://doi.org/10.1109/CISDA.2009.5356528   Google Scholar

Tong K. et al.: Recent Advances in Small Object Detection Based on Deep Learning: A Review. Image and Vision Computing 97, 2020, 103910 [https://doi.org/10.1016/j.imavis.2020.103910].
DOI: https://doi.org/10.1016/j.imavis.2020.103910   Google Scholar

Volkhonskiy Denis et al.: Steganographic Generative Adversarial Networks. 2019 [http://arxiv.org/abs/1703.05502].
  Google Scholar

Wu Ch. et al.: WGAN-E: A Generative Adversarial Networks for Facial Feature Security. Electronics 9(3), 2020, 486 [https://doi.org/10.3390/electronics9030486].
DOI: https://doi.org/10.3390/electronics9030486   Google Scholar

Yang J. et al.: Spatial Image Steganography Based on Generative Adversarial Network, 2018 [http://arxiv.org/abs/1804.07939].
  Google Scholar

Yang Y. et al.: GAN-Based Semi-Supervised Learning Approach for Clinical Decision Support in Health-IoT Platform. IEEE Access 7, 2019, 8048–8057 [https://doi.org/10.1109/ACCESS.2018.2888816].
DOI: https://doi.org/10.1109/ACCESS.2018.2888816   Google Scholar

Zenati H. et al.: Efficient GAN-Based Anomaly Detection. 2019. [http://arxiv.org/abs/1802.06222].
  Google Scholar

Zheng W. et al.: GAN-Based Key Secret-Sharing Scheme in Blockchain. IEEE Transactions on Cybernetics 51(1), 2021, 393–404 [https://doi.org/10.1109/TCYB.2019.2963138].
DOI: https://doi.org/10.1109/TCYB.2019.2963138   Google Scholar

Zhu J. Y. et al. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks, 2017 [https://doi.org/10.48550/ARXIV.1703.10593].
DOI: https://doi.org/10.1109/ICCV.2017.244   Google Scholar

Download


Published
2024-06-30

Cited by

Rayavarapu, S. M., Tammineni, S. P., Gottapu, S. R., & Singam, A. (2024). A REVIEW OF GENERATIVE ADVERSARIAL NETWORKS FOR SECURITY APPLICATIONS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 14(2), 66–70. https://doi.org/10.35784/iapgos.5778

Authors

Swarajya Madhuri Rayavarapu 
madhurirayavarapu.rs@andhrauniversity.edu.in
Andhra University, Department of Electronics and Communication Engineering India
https://orcid.org/0009-0007-7559-2142

Authors

Shanmukha Prasanthi Tammineni 

Andhra University, Department of Electronics and Communication Engineering India
https://orcid.org/0009-0000-5352-2265

Authors

Sasibhushana Rao Gottapu 

Andhra University, Department of Electronics and Communication Engineering India

Authors

Aruna Singam 

Andhra University, Department of Electronics and Communication Engineering India

Statistics

Abstract views: 311
PDF downloads: 167


License

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.


Most read articles by the same author(s)