Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200189-9.doi: 10.11896/jsjkx.241200189

• Information Security • Previous Articles     Next Articles

Research on Generating Adversarial Network Traffic Based on Generative Adversarial Network

YANG Lin1, LIN Honggang1,2   

  1. 1 College of Cyberspace Security,Chengdu University of Information Technology,Chengdu 610225,China
    2 Sichuan Key Laboratory of Advanced Cryptography and System Security,Chengdu 610225,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    National 242 Information Security Plan Project(2021-037) and Sichuan Provincial Natural Science Foundation Project(2024NSFSC0515).

Abstract: Adversarial network traffic plays a crucial role in fields such as device privacy protection and network security.How-ever,current adversarial network traffic generation methods lack constraints on quality,resulting in generated traffic that deviates from the original traffic characteristics,thereby losing its adversarial capability in practical applications.Therefore,this paper proposes a GAN-based adversarial network traffic generation method,which improves the generator design.The convolutional neural network is employed to extract abstract representations of original traffic features,and perturbations are generated through basic iterative algorithms to ensure that the perturbations maintain the characteristics of the original traffic.The generator loss function is optimized to achieve minimal differences between the generated traffic and the original traffic.Additionally,a perturber module is introduced,utilizing a grid search algorithm to assign weights to perturbations and optimize parameter combinations,ensuring the diversity of the generated traffic.To comprehensively consider the impact of feature space distance differences and relative change rates on generation quality,a relative difference disturbance metric is proposed to more accurately evaluate the differences between adversarial network traffic and the original traffic.Experimental results show that,within an effective perturbation range,compared to other methods,the adversarial network traffic generated by this method maintains a high deception rate for target classification models while producing smaller L disturbance and relative difference disturbance values,and exhibiting higher similarity to the original traffic,effectively improving the generation quality of adversarial network traffic.

Key words: Generative adversarial network, Adversarial network traffic, Relative differential disturbance, Similarity preservation objective function, Generative quality control

CLC Number: 

  • TP393
[1]ZHANG W,LIU Y,FENG Y,et al.A Comprehensive Review of Network Reconnaissance and Defense Technologies [J].Communications Technology,2022,55(10):1247-1256.
[2]HUI S,WANG H,WANG Z,et al.Knowledge Enhanced GANfor IoT Traffic Generation[C]//Proceedings of the ACM Web Conference.2022:3336-3346.
[3]JIA Z P,FANG B X,LIU C G,et al.Overview of Network Deception Techniques [J].Journal of Communications,2017,38(12):128-143.
[4]GOODFELLOW I,POUGET-ABADIE J,MIRZA M,et al.Ge-nerative Adversarial Nets[C]//28th Conference on Neural Information Processing Systems(NIPS).2014.
[5]WANG J,LU B,ZHU Y F.A Survey on the Generation and Application of Adversarial Network Traffic [J].Computer Science,2022,49(S2):651-661.
[6]ZHANG X,HAMM J,REITER M K,et al.Statistical Privacy for Streaming Traffic[C]//Proceedings of the 26th ISOC Symposium on Network and Distributed System Security.2019.
[7]HU Y J,GUO Y B,MA J,et al.Method for Generating Network Deceptive Traffic Based on Adversarial Samples [J].Journal of Communications,2020,41(9):59-70.
[8]MOORE A,ZUEV D,CROGAN M.Discriminators for use in flow-based classification[EB/OL].https://www.cl.cam.ac.uk/~awm22/publication/RR-05-13.pdf.
[9]RIGAKI M.Adversarial Deep Learning Against Intrusion Detection Classifiers[C]//2017 NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience(IST-152 2017).2017.
[10]HUANG C H,LEE T H,CHANG L,et al.Adversarial Attacks on SDN-based Deep Learning IDS System[C]//Mobile and Wireless Technology 2018:International Conference on Mobile and Wireless Technology(ICMWT 2018).Springer,2019:181-191.
[11]IBITOYE O,SHAFIQ O,MATRAWY A.Analyzing AdversarialAttacks Against Deep Learning for Intrusion Detection inIoT Networks[C]//2019 IEEE Global Communications Conference(GLOBECOM).IEEE,2019:1-6.
[12]LI J,ZHOU L,LI H,et al.Dynamic Traffic Feature Camouflaging Via Generative Adversarial Networks[C]//2019 IEEE Conference on Communications and Network Security(CNS).IEEE,2019:268-276.
[13]CHOUGULE A,AGRAWAL K,CHAMOLA V.Scan-gan:Generative Adversarial Network Based Synthetic Data Generation Technique for Controller Area Network[J].IEEE Internet of Things Magazine,2023,6(3):126-130.
[14]ANANDE T J,AL-SAADI S,LEESON M S.Generative Adversarial Networks for Network Traffic Feature Generation[J].International Journal of Computers and Applications,2023,45(4):297-305.
[15]HUI S,WANG H,WANG Z,et al.Knowledge Enhanced GAN forIoT Traffic Generation[C]//Proceedings of the ACM Web Conference 2022.2022:3336-3346.
[16]HUANG Y,CHEN Y,ZHANG Y,et al.TFHM:A Traffic Feature Hiding Scheme Based on Generative Adversarial Networks[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:175-182.
[17]LI J,ZHOU L,LI H X,et al.Network Traffic Feature Camouflage Technology Based on Generative Adversarial Networks [J].Computer Engineering,2019,45(12):119-126.
[18]SIVANATHAN A,SHERRATT D,GHARAKHEILI H H,et al.Characterizing and Classifying IoT Traffic in Smart Cities and Campuses[C]//2017 IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2017:559-564.
[19]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT Sentinel:Automated Device-type Identification for Security Enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).IEEE,2017:2177-2184.
[20]LI J,WANG D,LI S,et al.Deep Learning Based Adaptive Sequential Data Augmentation Technique for the Optical Network Traffic Synthesis[J].Optics Express,2019,27(13):18831-18847.
[1] GAO Xinjun, ZHANG Meixin, ZHU Li. Study on Short-time Passenger Flow Data Generation and Prediction Method for RailTransportation [J]. Computer Science, 2025, 52(6A): 240600017-5.
[2] ZHANG Yaolin, LIU Xiaonan, DU Shuaiqi, LIAN Demeng. Hybrid Quantum-classical Compressed Generative Adversarial Networks Based on Matrix Product Operators [J]. Computer Science, 2025, 52(6): 74-81.
[3] LIU Huayong, ZHU Ting. Semi-supervised Cross-modal Hashing Method for Semantic Alignment Networks Basedon GAN [J]. Computer Science, 2025, 52(6): 159-166.
[4] DING Ruiyang, SUN Lei, DAI Leyu, ZANG Weifei, XU Bayi. Generation Method for Adversarial Networks Traffic Based on Universal Perturbations [J]. Computer Science, 2025, 52(2): 336-343.
[5] LIU Yulu, WU Shuhong, YU Dan, MA Yao, CHEN Yongle. Cross-age Identity Membership Inference Based on Attention Feature Decomposition [J]. Computer Science, 2024, 51(9): 401-407.
[6] GUO Fangyuan, JI Genlin. Video Anomaly Detection Method Based on Dual Discriminators and Pseudo Video Generation [J]. Computer Science, 2024, 51(8): 217-223.
[7] HE Zhilin, GU Tianhao, XU Guanhua. Few-shot Semi-supervised Semantic Image Translation Algorithm Based on Prototype Correction [J]. Computer Science, 2024, 51(8): 224-231.
[8] ZHANG Le, YU Ying, GE Hao. Mural Inpainting Based on Fast Fourier Convolution and Feature Pruning Coordinate Attention [J]. Computer Science, 2024, 51(6A): 230400083-9.
[9] ZHUO Peiyan, ZHANG Yaona, LIU Wei, LIU Zijin, SONG You. CTGANBoost:Credit Fraud Detection Based on CTGAN and Boosting [J]. Computer Science, 2024, 51(6A): 230600199-7.
[10] XING Kaiyan, CHEN Wen. Multi-generator Active Learning Algorithm Based on Reverse Label Propagation and ItsApplication in Outlier Detection [J]. Computer Science, 2024, 51(4): 359-365.
[11] ZHANG Guodong, CHEN Zhihua, SHENG Bin. Infrared Small Target Detection Based on Dilated Convolutional Conditional GenerativeAdversarial Networks [J]. Computer Science, 2024, 51(2): 151-160.
[12] WANG Bo, ZHAO Jincheng, XU Bingfeng, HE Gaofeng. Zero Day Attack Detection Method for Internet of Vehicles [J]. Computer Science, 2024, 51(12): 334-342.
[13] YE Ruiwen, WANG Baohui. 3D Reconstruction Algorithm for Lower Limb X-ray Images Based on Generative AdversarialNetworks [J]. Computer Science, 2024, 51(11A): 230900089-7.
[14] FAN Yi, HU Tao, YI Peng. System Call Host Intrusion Detection Technology Based on Generative Adversarial Network [J]. Computer Science, 2024, 51(10): 408-415.
[15] WU Guibin, YANG Zongyuan, XIONG Yongping, ZHANG Xing, WANG Wei. Seal Removal Based on Generative Adversarial Gated Convolutional Network [J]. Computer Science, 2024, 51(1): 198-206.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!