Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250200021-8.doi: 10.11896/jsjkx.250200021

• Information Security • Previous Articles     Next Articles

Traffic Generation Methods Based on Temporal Generative Adversarial Networks

LIN Honggang, LI Yuhan   

  1. School of Cybersecurity(XinGu Industrial College),Chengdu University of Information Technology,Chengdu 610225,China
  • Online:2025-11-15 Published:2025-11-10
  • About author:LIN Honggang,born in 1976,Ph.D,professor.His main research interests include cloud computing,big data security,artificial intelligence and cybersecurity.
    LI Yuhan,born in 2000,postgraduate.His main research interests include traffic generation and cyberspace secu-rity.
  • Supported by:
    National 242 Information Security Program Project(2021-037) and Sichuan Natural Science Foundation(2024NSFSC0515).

Abstract: With the advancement of network traffic analysis techniques,the demand for high-quality synthetic traffic data conti-nues to grow.However,most existing traffic generation methods primarily focus on packet-level features while neglecting temporal dependencies,leading to suboptimal performance.To address this limitation,an enhanced traffic generation approach based on TimeGAN is proposed.This method employs a Gated Recurrent Unit(GRU) to jointly capture both packet-level and temporal features.Additionally,a multi-head local-global attention mechanism is integrated to improve feature fusion and achieve balanced modeling of traffic characteristics.A periodicity-aware discriminator and dynamic decoding strategy are further introduced to ge-nerate variable-length traffic sequences while preserving periodic patterns.The generated traffic is evaluated in terms of usability and similarity,with experimental results demonstrating superior performance across multiple metrics compared to existing me-thods.This approach effectively enhances the quality of synthetic traffic and provides a more realistic emulation of actual network behavior.

Key words: Traffic generation, TimeGAN, Multi-head local-global attention mechanism, Dynamic decoding

CLC Number: 

  • TP391
[1]ADELEKE O A,BASTIN N,GURKAN D.Network trafficgeneration:A survey and methodology[J].ACM Computing Surveys(CSUR),2022,55(2):1-23.
[2]LU X L,LI Z L.IoT Device Recognition Method Combining Multimodal IoT Device Fingerprint and Ensemble Learning[J].Computer Science,2024,51(9):371-382.
[3]SIVAROOPAN N,BANDARA D,MADARASINGHA C,et al.Netdiffus:Network traffic generation by diffusion models through time-series imaging[J].Computer Networks,2024,251:110616.
[4]ANANDE T J,AL-SAADI S,LEESON M S.Generative adver-sarial networks for network traffic feature generation[J].International Journal of Computers and Applications,2023,45(4):297-305.
[5]BENADDI H,JOUHARI M,IBRAHIMI K,et al.Adversarialattacks against iot networks using conditional gan based lear-ning[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference.IEEE,2022:2788-2793.
[6]GE Z,WU H,CHENG G,et al.NFlowGAN:High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN[C]//ICC 2023-IEEE International Conference on Communications.IEEE,2023:4057-4062.
[7]HUI S D,WANG H D,WANG Z H,et al.Knowledge Enhanced GAN for IoT Traffic Genera-tion[C]//Proceedings of the ACM Web Conference 2022(WWW ’22).Association for Computing Machinery,New York,NY,USA,2022:3336-3346.
[8]ZHANG Y W,ZHANG Y C,WU Y,et al.Research on Improvement of Generation Adversarial Networks for Network Traffic Datasets Augmentation[J].Computer Engineering and Applications,2024,60(18):275-284.
[9]KHOLGH D K,KOSTAKOS P.PAC-GPT:A novel approach to generating synthetic network traffic with GPT-3[J].IEEE Access,2023,11:114936-114951.
[10]BANO S,CASSARÁ P,VALERIO L.Variational Autoencoders for Noise Resistant Traffic Generation in B5G Net-works[C]//2024 IEEE International Mediterranean Conference on Communications and Networking(MeditCom).IEEE,2024:13-18.
[11]LI W,ZHANG C.A hidden markov model for condition monitoring of time series data in complex network systems[J].IEEE Transactions on Reliability,2023,72(4):1478-1492.
[12]MESLET-MILLET F,MOUYSSET S,CHAPUT E.NeCST-Gen:An approach for realistic network traffic generation using deep learning[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference.IEEE,2022:3108-3113.
[13]LI J,ZHOU L,LI H,et al.Dynamic traffic feature camou-flaging via generative adversarial networks[C]//2019 IEEE Conference on Communications and Network Security(CNS).IEEE,2019:268-276.
[14]SHAHID M R,BLANC G,JMILA H,et al.Gen-erative Deep Learning for Internet of Things Network Traffic Generation[C]//2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing(PRDC),Perth,WA,Australia,2020:70-79.
[15]YOON J,JARRETT D,SCHAAR M V D.Time-series Generative Adversarial Networks[C]//Neural Information Processing Systems(NeurIPS).2019.
[16]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.Iot sentinel:Au-tomated device-type identification for security enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).IEEE,2017:2177-2184.
[17]QU J,MA X,LI J.Trafficgpt:Breaking the token barrier for efficient long traffic analysis and generation[J].arXiv:2403.05822,2024.
[18]ZHAO F,ZHANG M,ZHOU S,et al.Detection of network security traffic anomalies based on machine learning KNN method[J].Journal of Artificial Intelligence General Science(JAIGS).2024,1(1):209-218.
[19]DONG S.Multi class SVM algorithm with active learning fornetwork traffic classification[J].Expert Systems with Applications,2021,176:114885.
[20]LABAYEN V,MAGAÑA E,MORATÓ D,et al.Online classification of user activities using machine learning on network traffic[J].Computer Networks,2020,181:107557.
[21]SONG Z,ZHAO Z,ZHANG F,et al.I ∧{2}$ RNN:An In-cremental and Interpretable Recurrent Neural Network for Encrypted Traffic Classification[J].IEEE Transactions on Dependable and Secure Computing(Early Access).
[22]WANG Y,WANG F,TIAN Q,et al.Dynamic Bandwidth allo-cation algorithm based on traffic classification with the aid of LSTM and GRU for industrial passive optical networks[C]//2023 21st International Conference on Optical Communications and Networks(ICOCN).IEEE,2023:1-3.
[23]KURITA T.Principal Component Analysis(PCA)[M]//Com-puter vision:a reference guide.Cham:Springer International Publishing,2021:1013-1016.
[1] CHEN Han, XU Zefeng, JIANG Jiu, FAN Fan, ZHANG Junjian, HE Chu, WANG Wenwei. Large Language Model and Deep Network Based Cognitive Assessment Automatic Diagnosis [J]. Computer Science, 2026, 53(3): 41-51.
[2] LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87.
[3] CUI Mengtian, HE Liwen, XIE Qi, WANG Fang. Group Semantic-driven Hypergraph Network for Disinformation Detection with Fusion PropagationStructure [J]. Computer Science, 2026, 53(3): 88-96.
[4] QIAN Qing, CHEN Huicheng, CUI Yunhe, TANG Ruixue, FU Jinmei. Joint Entity and Relation Extraction Method with Multi-scale Collaborative Aggregation and Axial-semantic Guidance [J]. Computer Science, 2026, 53(3): 97-106.
[5] YU Chengcheng, JIANG Yongfa, CHEN Fangshu, WANG Jiahui, MENG Xiankai. Multi-view Exercise Representation and Forgetting Mechanism for Deep KnowledgeTracing [J]. Computer Science, 2026, 53(3): 107-114.
[6] FAN Wenshu, WAN Shenghua, LI Xinchun, SUN Haihang, HUANG Kaichen, GAN Le, ZHAN Dechuan. Twice Learning Revitalizes Behavior Cloning [J]. Computer Science, 2026, 53(3): 129-135.
[7] LI Hao, DING Lizhong, FU Jiarun, LINGHU Zhaohuan. Data Compression of Instruction Fine-tuning for Large Models:Refinement Based on Inference Contribution [J]. Computer Science, 2026, 53(3): 136-142.
[8] LIU Huashuai, TAO Houguo, YUE Kun, DUAN Liang. Bayesian Network Based Fault Root Cause Analysis [J]. Computer Science, 2026, 53(3): 143-150.
[9] HOU Jingle, LI Zhengjun, DAI Qiangqiang, LI Ronghua, WANG Guoren. Research on Maximal Directed k-plex Enumeration Problem [J]. Computer Science, 2026, 53(3): 166-172.
[10] WU Jiahao, PENG Li, YANG Jielong. Partial Domain Adaptation Based on Machine Unlearning [J]. Computer Science, 2026, 53(3): 173-180.
[11] SANG Shilong, CHEN Kejia. Type-steered Edge Matching for Heterogeneous Graph Similarity Learning [J]. Computer Science, 2026, 53(3): 181-187.
[12] WANG Jinghong, LI Pengchao, WANG Xizhao, ZHANG Zili. Dual-channel Graph Neural Network Based on KAN [J]. Computer Science, 2026, 53(3): 188-196.
[13] LI Linhao, XU Yanan, DONG Yongfeng, WANG Zhen. Social Learning Based on Multi-expert Collaboration and Information Interaction [J]. Computer Science, 2026, 53(3): 197-206.
[14] ZOU Xiaoyang, JU Hengrong, CAO Jinxin, MA Xingru, HUANG Jiashuang, DING Weiping. Overlapping Community Detection with Graph Regularized Fuzzy Autoencoder [J]. Computer Science, 2026, 53(3): 207-213.
[15] WANG Yizong, NING Hongbo, WANG Haofeng, MA Siwei, GAO Wen. Low-bitrate and Real-time Multiview Video Streaming with 3D Gaussian Splatting [J]. Computer Science, 2026, 53(3): 225-230.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!