A Review on Application of GANs in Cybersecurity Domain

被引:9
作者
Arora, Aayush [1 ]
Shantanu [2 ]
机构
[1] IIT Hyderabad, Elect Dept, Hyderabad, India
[2] Def Res & Dev Org, Dte IT & Cyber Secur, New Delhi, India
关键词
Anomaly detection; Anomaly generation; Cybersecurity; GANs; Intrusion detection system; Steganography;
D O I
10.1080/02564602.2020.1854058
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cybersecurity is essential to protect the tremendous increase in data stored on servers and its transmission on networks. The techniques used to detect threats and preserve data need to be updated regularly to prevent advanced attacks in the future. The information transferred over a network is converted into unintelligible data using codes and cyphers to achieve data integrity and confidentiality. At present, a firewall is used to block unknown traffic, antimalware software to detect viruses, trojan, worms and intrusion detection systems to detect attacks. The security professionals are employing Generative Adversarial Networks (GANs) to produce amazing results in fields such as Intrusion Detection, Steganography, Password Cracking, and Anomaly Generation. This paper presents a systematic literature review of GANs applications in the cybersecurity domain, including analysis of specific extended GAN frameworks and currently used stable cybersecurity datasets.
引用
收藏
页码:433 / 441
页数:9
相关论文
共 29 条
  • [1] Ahmadian S, 2018, IEEE GLOB CONF SIG, P942, DOI 10.1109/GlobalSIP.2018.8646424
  • [2] Arjovsky M, 2017, PR MACH LEARN RES, V70
  • [3] Babu R. M. H, 2018, CRYPTOGRAPHY SECURIT
  • [4] A Survey of Deep Learning Methods for Cyber Security
    Berman, Daniel S.
    Buczak, Anna L.
    Chavis, Jeffrey S.
    Corbett, Cherita L.
    [J]. INFORMATION, 2019, 10 (04)
  • [5] Chen H., 2019, GAN BASED METHOD CYB
  • [6] Generative Adversarial Networks An overview
    Creswell, Antonia
    White, Tom
    Dumoulin, Vincent
    Arulkumaran, Kai
    Sengupta, Biswa
    Bharath, Anil A.
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (01) : 53 - 65
  • [7] Donahue J., 2016, PROC INT C LEARN REP
  • [8] Ferdowsi A., 2019, IEEE GLOB COMM CONF
  • [9] Goodfellow etal, 2014, ARXIV14062661
  • [10] Hamid Y., 2018, INT J NETW SECUR, V20, P645