An Adaptive Enhancement Method of Malicious Traffic Samples Based on DCGAN-ResNet System

An Adaptive Enhancement Method of Malicious Traffic Samples Based on DCGAN-ResNet System

Qiankun Li, Juan Li, Yao Li, Feng Jiu, Yunxia Chu
DOI: 10.4018/IJITSA.343317
Article PDF Download
Open access articles are freely available for download

Abstract

A malicious traffic sample adaptive enhancement device based on Deep Convolutional Generative Adversarial Network (DCGAN) is designed to address the issue of imbalanced network traffic data distribution, aiming to enhance the accuracy and efficiency of anomaly detection. By leveraging generative adversarial network technology, this device can generate samples similar to real malicious traffic to balance the training dataset. It utilizes the generator and discriminator of the Deep Convolutional Generative Adversarial Network (DCGAN), combined with the residual network (ResNet) in the CNN model, to enhance the quality of generated samples. The device can switch states to adapt to various network environments and has been experimentally validated for its effectiveness and feasibility.Moreover, employing an adaptive device, the samples of malicious traffic are adjusted. Experimental analysis demonstrates that the device significantly enhances the accuracy of anomaly traffic detection, improves robustness, and provides robust support for network security protection.
Article Preview
Top

Literature Review

Chuang & Wu (2019) proposed a novel method utilizing deep learning to generate data models aimed at balancing network intrusion detection datasets, thereby enhancing detection capabilities. This provides an effective solution to the deficiencies and imbalances in network intrusion detection. However, the training of deep learning models requires significant computational resources and time, which may limit their applicability in certain domains. Jiao et al. (2022) discuss machine learning model reconstruction and sample generation methods for malicious traffic detection, and according to the authors, existing machine learning models face issues like overfitting and underfitting in malicious traffic detection, affecting the accuracy and reconstruction rate of the models. They propose a solution based on model reconstruction and sample generation using a graph-based adaptive sample generation algorithm, quickly creating uniformly distributed generated samples in the input domain (Jiao et al., 2022). Although this method can generate and train reconstructed models like the target model, it may not fully replicate all the features and behaviors of the target model due to the lack of all information and details.

Many studies use generative adversarial network (GAN) (Goodfellow et al., 2018) or their derivative structures to address sample imbalance issues. GAN essentially consists of a generator and a discriminator. Recently, GAN has gradually been applied to adversarial example generation tasks (Zhang et al., 2022). For example, Rathore et al. (2021) proposed a GAN-based malicious sample generation method and a sequence feature selection method combining variance and correlation analysis to address imbalance issues in PIoT trajectory data. Building different GAN models to handle different categories of malicious traffic can better address data imbalance issues, improving model generalization and robustness (Sharma et al., 2021). However, DCGAN uses deep convolutional neural networks, capturing data features better than GAN through fully connected layers, thus generating samples more effectively.

Jamoos et al. (2023) state that the performance of traditional machine learning methods largely depends on dataset balance. However, many IDS datasets exhibit imbalanced class distributions, making threat detection challenging in some minority classes. To address this, a new model based on GAN – temporal dilated convolutional generative adversarial network (TDCGAN) – has been proposed. Moti et al. (2021) introduced a novel malicious software detection and generation framework called MalGAN for the Internet of Things (IoT) network edge. Unlike traditional feature-based methods, MalGAN does not require prior knowledge of malicious software and can automatically learn and generate new malicious software samples from raw bytecode. Nevertheless, redundant data may lead to storage wastage, especially when dealing with large datasets.

Additionally, Daniyal used DCGAN to deceive malicious software classifiers into believing they are normal entities. In this work, issues related to model collapse, instability, and vanishing gradients in the DCGAN were addressed by the proposed hybrid Aquila optimizer-Mine burst and harmony search (AO-MBHS) (Alghazzawi et al., 2022). However, there are many improved algorithms for the Aquila optimizer that require further research and optimization.

When dealing with highly imbalanced data distributions, normal samples typically outnumber abnormal ones significantly. Directly modeling and analyzing imbalanced data can lead to model bias, thereby affecting model accuracy (Yang et al., 2023). The innovative design of the malicious traffic sample enhancement system in this paper includes the use of a DCGAN to construct the generator, coupled with the ResNet from the CNN model. This design enables deep neural networks to train without encountering gradient disappearance issues. Additionally, the system utilizes a state-switching button to control the status of the malicious traffic sample enhancement system, providing two modes: PASS and WORKING. Such a sample enhancement system helps address certain biased traffic data issues, enhancing the effectiveness of detection models.

Complete Article List

Search this Journal:
Reset
Volume 17: 1 Issue (2024)
Volume 16: 3 Issues (2023)
Volume 15: 3 Issues (2022)
Volume 14: 2 Issues (2021)
Volume 13: 2 Issues (2020)
Volume 12: 2 Issues (2019)
Volume 11: 2 Issues (2018)
Volume 10: 2 Issues (2017)
Volume 9: 2 Issues (2016)
Volume 8: 2 Issues (2015)
Volume 7: 2 Issues (2014)
Volume 6: 2 Issues (2013)
Volume 5: 2 Issues (2012)
Volume 4: 2 Issues (2011)
Volume 3: 2 Issues (2010)
Volume 2: 2 Issues (2009)
Volume 1: 2 Issues (2008)
View Complete Journal Contents Listing