Ajou University repository

A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detectionoa mark
  • Dunmore, Aeryn ;
  • Jang-Jaccard, Julian ;
  • Sabrina, Fariza ;
  • Kwak, Jin
Citations

SCOPUS

48

Citation Export

Publication Year
2023-01-01
Publisher
Institute of Electrical and Electronics Engineers Inc.
Citation
IEEE Access, Vol.11, pp.76071-76094
Keyword
adversarial examplesattack modelingdata augmentationGenerative adversarial networks (GAN)intrusion detection systemsmachine learningresearch surveythreat detectionzero-day attacks
Mesh Keyword
Adversarial exampleAttack modelingData augmentationGameGenerative adversarial networkGeneratorIntrusion Detection SystemsMachine-learningResearch surveyThreat detectionZero day attack
All Science Classification Codes (ASJC)
Computer Science (all)Materials Science (all)Engineering (all)
Abstract
Generative Adversarial Networks (GANs) have seen significant interest since their introduction in 2014. While originally focused primarily on image-based tasks, their capacity for generating new, synthetic data has brought them into many different fields of Machine Learning research. Their use in cybersecurity has grown swiftly, especially in tasks which require training on unbalanced datasets of attack classes. In this paper we examine the use of GANs in Intrusion Detection Systems (IDS) and how they are currently being employed in this area of research. GANs are currently in use for the creation of adversarial examples, editing the semantic information of data, creating polymorphic samples of malware, augmenting data for rare classes, and much more. We have endeavored to create a paper that may act as a primer for cybersecurity specialists and machine learning researchers alike. This paper details what GANs are and how they work, the current types of GAN in use in the area, datasets used in this research, metrics for evaluation, current areas of use in intrusion detection, and when and how they are best used.
ISSN
2169-3536
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/33538
DOI
https://doi.org/10.1109/access.2023.3296707
Fulltext

Type
Article
Funding
This work was supported by the Ministry of Business, Innovation, and Employment (MBIE) from the New Zealand Government under Grant MAUX1912.
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.