Ajou University repository

A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detectionoa mark
  • Dunmore, Aeryn ;
  • Jang-Jaccard, Julian ;
  • Sabrina, Fariza ;
  • Kwak, Jin
Citations

SCOPUS

48

Citation Export

DC Field Value Language
dc.contributor.authorDunmore, Aeryn-
dc.contributor.authorJang-Jaccard, Julian-
dc.contributor.authorSabrina, Fariza-
dc.contributor.authorKwak, Jin-
dc.date.issued2023-01-01-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/33538-
dc.description.abstractGenerative Adversarial Networks (GANs) have seen significant interest since their introduction in 2014. While originally focused primarily on image-based tasks, their capacity for generating new, synthetic data has brought them into many different fields of Machine Learning research. Their use in cybersecurity has grown swiftly, especially in tasks which require training on unbalanced datasets of attack classes. In this paper we examine the use of GANs in Intrusion Detection Systems (IDS) and how they are currently being employed in this area of research. GANs are currently in use for the creation of adversarial examples, editing the semantic information of data, creating polymorphic samples of malware, augmenting data for rare classes, and much more. We have endeavored to create a paper that may act as a primer for cybersecurity specialists and machine learning researchers alike. This paper details what GANs are and how they work, the current types of GAN in use in the area, datasets used in this research, metrics for evaluation, current areas of use in intrusion detection, and when and how they are best used.-
dc.description.sponsorshipThis work was supported by the Ministry of Business, Innovation, and Employment (MBIE) from the New Zealand Government under Grant MAUX1912.-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshAdversarial example-
dc.subject.meshAttack modeling-
dc.subject.meshData augmentation-
dc.subject.meshGame-
dc.subject.meshGenerative adversarial network-
dc.subject.meshGenerator-
dc.subject.meshIntrusion Detection Systems-
dc.subject.meshMachine-learning-
dc.subject.meshResearch survey-
dc.subject.meshThreat detection-
dc.subject.meshZero day attack-
dc.titleA Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection-
dc.typeArticle-
dc.citation.endPage76094-
dc.citation.startPage76071-
dc.citation.titleIEEE Access-
dc.citation.volume11-
dc.identifier.bibliographicCitationIEEE Access, Vol.11, pp.76071-76094-
dc.identifier.doi10.1109/access.2023.3296707-
dc.identifier.scopusid2-s2.0-85165249893-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639-
dc.subject.keywordadversarial examples-
dc.subject.keywordattack modeling-
dc.subject.keyworddata augmentation-
dc.subject.keywordGenerative adversarial networks (GAN)-
dc.subject.keywordintrusion detection systems-
dc.subject.keywordmachine learning-
dc.subject.keywordresearch survey-
dc.subject.keywordthreat detection-
dc.subject.keywordzero-day attacks-
dc.description.isoatrue-
dc.subject.subareaComputer Science (all)-
dc.subject.subareaMaterials Science (all)-
dc.subject.subareaEngineering (all)-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.