Accès libre

Research on Network Attack Sample Generation and Defence Techniques Based on Generative Adversarial Networks

,  et   
27 nov. 2024
À propos de cet article

Citez
Télécharger la couverture

Zhao, X. (2020). Attack-defense game model: Research on dynamic defense mechanism of network security. International Journal of Network Security, 22(6), 1037-1042.Search in Google Scholar

Miller, D. J., Xiang, Z., & Kesidis, G. (2020). Adversarial learning targeting deep neural network classification: A comprehensive review of defenses against attacks. Proceedings of the IEEE, 108(3), 402-433.Search in Google Scholar

Sun, L., Dou, Y., Yang, C., Zhang, K., Wang, J., Philip, S. Y., ... & Li, B. (2022). Adversarial attack and defense on graph data: A survey. IEEE Transactions on Knowledge and Data Engineering, 35(8), 7693-7711.Search in Google Scholar

Ma, S., & Liu, Y. (2019, February). Nic: Detecting adversarial samples with neural network invariant checking. In Proceedings of the 26th network and distributed system security symposium (NDSS 2019).Search in Google Scholar

Yuan, X., Li, C., & Li, X. (2017, May). DeepDefense: identifying DDoS attack via deep learning. In 2017 IEEE international conference on smart computing (SMARTCOMP) (pp. 1-8). IEEE.Search in Google Scholar

Lin, Z., Shi, Y., & Xue, Z. (2022, May). Idsgan: Generative adversarial networks for attack generation against intrusion detection. In Pacific-asia conference on knowledge discovery and data mining (pp. 79-91). Cham: Springer International Publishing.Search in Google Scholar

Mopuri, K. R., Ojha, U., Garg, U., & Babu, R. V. (2018). Nag: Network for adversary generation. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 742-751).Search in Google Scholar

Alzantot, M., Sharma, Y., Chakraborty, S., Zhang, H., Hsieh, C. J., & Srivastava, M. B. (2019, July). Genattack: Practical black-box attacks with gradient-free optimization. In Proceedings of the genetic and evolutionary computation conference (pp. 1111-1119).Search in Google Scholar

Ring, M., Schlör, D., Landes, D., & Hotho, A. (2019). Flow-based network traffic generation using generative adversarial networks. Computers & Security, 82, 156-172.Search in Google Scholar

Hong, K., Kim, Y., Choi, H., & Park, J. (2017). SDN-assisted slow HTTP DDoS attack defense method. IEEE Communications Letters, 22(4), 688-691.Search in Google Scholar

Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., & Kambhampati, S. (2020). A survey of moving target defenses for network security. IEEE Communications Surveys & Tutorials, 22(3), 1909-1941.Search in Google Scholar

Fraunholz, D., & Schotten, H. D. (2018, January). Strategic defense and attack in deception based network security. In 2018 International Conference on Information Networking (ICOIN) (pp. 156-161). IEEE.Search in Google Scholar

Phan, T. V., & Park, M. (2019). Efficient distributed denial-of-service attack defense in SDN-based cloud. IEEE Access, 7, 18701-18714.Search in Google Scholar

Ade Kurniawan, Yuichi Ohsita & Masayuki Murata. (2024). Detection of sensors used for adversarial examples against machine learning models. Results in Engineering103021-103021.Search in Google Scholar

Pengwei Zhang, Jiadong Ren, Fengda Zhao, Xianshan Li, Haitao He, Yufeng Jia & Xiaoqing Shao. (2024). MS-CGAN: Fusion of conditional generative adversarial networks and multi-scale spatio-temporal features for lithology identification. Journal of Applied Geophysics105531-105531.Search in Google Scholar

K. Sreekumar & E. R. Vimina. (2024). Multi-Label Classification of Fundus Images with Optimized Vision Transformer Based Wasserstein Deep Convolutional Generative Adversarial Network. SN Computer Science(7),842-842.Search in Google Scholar

Z. Zou, P.T. Teo, A. Yalamanchili & M. Abazeed. (2024). Optimizing Deep Learning Models: CNNRNN Augmentation with Grad-CAM Analysis for Predicting Pneumonitis from Pre-Treatment CT Images. International Journal of Radiation Oncology, Biology, Physics(2S),e670-e670.Search in Google Scholar

Haohan Sun, Liqian Xia, Yihu Zhou, Weifang Qian, Wanyong Wang & Ke Zhang. (2024). Online detection and evaluation of weld surface defects based on lightweight network VGG16-UNet and laser scanning. Journal of Manufacturing Processes292-306.Search in Google Scholar