Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data

Author(s):  
Xingran Hao ◽  
Zhengwei Jiang ◽  
Qingsai Xiao ◽  
Qiuyun Wang ◽  
Yepeng Yao ◽  
...  
2021 ◽  
pp. 1-30
Author(s):  
Qingtian Zou ◽  
Anoop Singhal ◽  
Xiaoyan Sun ◽  
Peng Liu

Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic-flaw-exploiting network attacks often do not have distinguishing signatures, and can thus easily evade the typical signature-based network intrusion detection systems. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach based on protocol fuzzing to automatically generate high-quality network data, on which deep learning models can be trained for network attack detection. Our findings show that protocol fuzzing can generate data samples that cover real-world data, and deep learning models trained with fuzzed data can successfully detect the logic-flaw-exploiting network attacks.


Author(s):  
Felipe Barbosa Abreu ◽  
Anderson Morais ◽  
Ana Cavalli ◽  
Bachar Wehbi ◽  
Edgardo Montes de Oca ◽  
...  

2021 ◽  
Vol 2010 (1) ◽  
pp. 012146
Author(s):  
Shimin Sun ◽  
Xinchao Zhang ◽  
Wentian Huang ◽  
Aixin Xu ◽  
Xiaofan Wang ◽  
...  

2021 ◽  
Author(s):  
Tong Yu ◽  
Ming Xie ◽  
Xin Li ◽  
Ying Ling ◽  
Dongmei Bin ◽  
...  

2021 ◽  
Author(s):  
Youssef F. Sallam ◽  
Hossam El-din H. Ahmed ◽  
Adel Saleeb ◽  
Nirmeen A. El-Bahnasawy ◽  
Fathi E. Abd El-Samie

Author(s):  
Darshan Mansukhbhai Tank ◽  
Akshai Aggarwal ◽  
Nirbhay Kumar Chaubey

Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.


Sign in / Sign up

Export Citation Format

Share Document