Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250200021-8.doi: 10.11896/jsjkx.250200021

• Information Security • Previous Articles     Next Articles

Traffic Generation Methods Based on Temporal Generative Adversarial Networks

LIN Honggang, LI Yuhan   

  1. School of Cybersecurity(XinGu Industrial College),Chengdu University of Information Technology,Chengdu 610225,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    National 242 Information Security Program Project(2021-037) and Sichuan Natural Science Foundation(2024NSFSC0515).

Abstract: With the advancement of network traffic analysis techniques,the demand for high-quality synthetic traffic data conti-nues to grow.However,most existing traffic generation methods primarily focus on packet-level features while neglecting temporal dependencies,leading to suboptimal performance.To address this limitation,an enhanced traffic generation approach based on TimeGAN is proposed.This method employs a Gated Recurrent Unit(GRU) to jointly capture both packet-level and temporal features.Additionally,a multi-head local-global attention mechanism is integrated to improve feature fusion and achieve balanced modeling of traffic characteristics.A periodicity-aware discriminator and dynamic decoding strategy are further introduced to ge-nerate variable-length traffic sequences while preserving periodic patterns.The generated traffic is evaluated in terms of usability and similarity,with experimental results demonstrating superior performance across multiple metrics compared to existing me-thods.This approach effectively enhances the quality of synthetic traffic and provides a more realistic emulation of actual network behavior.

Key words: Traffic generation, TimeGAN, Multi-head local-global attention mechanism, Dynamic decoding

CLC Number: 

  • TP391
[1]ADELEKE O A,BASTIN N,GURKAN D.Network trafficgeneration:A survey and methodology[J].ACM Computing Surveys(CSUR),2022,55(2):1-23.
[2]LU X L,LI Z L.IoT Device Recognition Method Combining Multimodal IoT Device Fingerprint and Ensemble Learning[J].Computer Science,2024,51(9):371-382.
[3]SIVAROOPAN N,BANDARA D,MADARASINGHA C,et al.Netdiffus:Network traffic generation by diffusion models through time-series imaging[J].Computer Networks,2024,251:110616.
[4]ANANDE T J,AL-SAADI S,LEESON M S.Generative adver-sarial networks for network traffic feature generation[J].International Journal of Computers and Applications,2023,45(4):297-305.
[5]BENADDI H,JOUHARI M,IBRAHIMI K,et al.Adversarialattacks against iot networks using conditional gan based lear-ning[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference.IEEE,2022:2788-2793.
[6]GE Z,WU H,CHENG G,et al.NFlowGAN:High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN[C]//ICC 2023-IEEE International Conference on Communications.IEEE,2023:4057-4062.
[7]HUI S D,WANG H D,WANG Z H,et al.Knowledge Enhanced GAN for IoT Traffic Genera-tion[C]//Proceedings of the ACM Web Conference 2022(WWW ’22).Association for Computing Machinery,New York,NY,USA,2022:3336-3346.
[8]ZHANG Y W,ZHANG Y C,WU Y,et al.Research on Improvement of Generation Adversarial Networks for Network Traffic Datasets Augmentation[J].Computer Engineering and Applications,2024,60(18):275-284.
[9]KHOLGH D K,KOSTAKOS P.PAC-GPT:A novel approach to generating synthetic network traffic with GPT-3[J].IEEE Access,2023,11:114936-114951.
[10]BANO S,CASSARÁ P,VALERIO L.Variational Autoencoders for Noise Resistant Traffic Generation in B5G Net-works[C]//2024 IEEE International Mediterranean Conference on Communications and Networking(MeditCom).IEEE,2024:13-18.
[11]LI W,ZHANG C.A hidden markov model for condition monitoring of time series data in complex network systems[J].IEEE Transactions on Reliability,2023,72(4):1478-1492.
[12]MESLET-MILLET F,MOUYSSET S,CHAPUT E.NeCST-Gen:An approach for realistic network traffic generation using deep learning[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference.IEEE,2022:3108-3113.
[13]LI J,ZHOU L,LI H,et al.Dynamic traffic feature camou-flaging via generative adversarial networks[C]//2019 IEEE Conference on Communications and Network Security(CNS).IEEE,2019:268-276.
[14]SHAHID M R,BLANC G,JMILA H,et al.Gen-erative Deep Learning for Internet of Things Network Traffic Generation[C]//2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing(PRDC),Perth,WA,Australia,2020:70-79.
[15]YOON J,JARRETT D,SCHAAR M V D.Time-series Generative Adversarial Networks[C]//Neural Information Processing Systems(NeurIPS).2019.
[16]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.Iot sentinel:Au-tomated device-type identification for security enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).IEEE,2017:2177-2184.
[17]QU J,MA X,LI J.Trafficgpt:Breaking the token barrier for efficient long traffic analysis and generation[J].arXiv:2403.05822,2024.
[18]ZHAO F,ZHANG M,ZHOU S,et al.Detection of network security traffic anomalies based on machine learning KNN method[J].Journal of Artificial Intelligence General Science(JAIGS).2024,1(1):209-218.
[19]DONG S.Multi class SVM algorithm with active learning fornetwork traffic classification[J].Expert Systems with Applications,2021,176:114885.
[20]LABAYEN V,MAGAÑA E,MORATÓ D,et al.Online classification of user activities using machine learning on network traffic[J].Computer Networks,2020,181:107557.
[21]SONG Z,ZHAO Z,ZHANG F,et al.I ∧{2}$ RNN:An In-cremental and Interpretable Recurrent Neural Network for Encrypted Traffic Classification[J].IEEE Transactions on Dependable and Secure Computing(Early Access).
[22]WANG Y,WANG F,TIAN Q,et al.Dynamic Bandwidth allo-cation algorithm based on traffic classification with the aid of LSTM and GRU for industrial passive optical networks[C]//2023 21st International Conference on Optical Communications and Networks(ICOCN).IEEE,2023:1-3.
[23]KURITA T.Principal Component Analysis(PCA)[M]//Com-puter vision:a reference guide.Cham:Springer International Publishing,2021:1013-1016.
[1] FANG Quan, ZHANG Jinlong, WANG Bingqian, HU Jun. Research on Domain Knowledge Question Answering via Large Language Models withCompositional Context Prompting [J]. Computer Science, 2025, 52(11): 13-21.
[2] PI Qiankun, LU Jicang, ZHU Taojie, PENG Yueling. Zero-shot Knowledge Extraction Method Based on Large Language Model Enhanced [J]. Computer Science, 2025, 52(11): 22-29.
[3] ZHANG Haoran, HAO Wenning, JIN Dawei, CHENG Kai, ZHAI Ying. DF-RAG:A Retrieval-augmented Generation Method Based on Query Rewriting and Knowledge Selection [J]. Computer Science, 2025, 52(11): 30-39.
[4] HU Jintao, XIAN Guangming. Self-attention-based Graph Contrastive Learning for Recommendation [J]. Computer Science, 2025, 52(11): 82-89.
[5] WANG Wenpeng, GE Hongwei, LI Ting. Adversarial Generative Multi-sensitive Attribute Data Biasing Method [J]. Computer Science, 2025, 52(11): 90-97.
[6] CHEN Kang, LIN Jianhan, LIU Yuanjie. Survey on Image Deblurring Algorithms [J]. Computer Science, 2025, 52(11): 98-112.
[7] QIN Yi, ZHAN Pengxiang, XIAN Feng, LIU Chenlong, WANG Minghui. FE-DARFormer:Image Desnowing Model Based on Frequency Enhancement and Degradation- aware Routing Transformer [J]. Computer Science, 2025, 52(11): 113-122.
[8] YAN Zhilin, NIE Rencan. Infrared and Visible Image Fusion Cross-modality Contrastive Representation Network Based on Rolling MLP Feature Extraction [J]. Computer Science, 2025, 52(11): 123-130.
[9] CHEN Chongyang, PENG Li, YANG Jielong. UAV Small Object Detection Algorithm Based on Feature Enhancement and Context Fusion [J]. Computer Science, 2025, 52(11): 131-140.
[10] DING Yuanbo, BAI Lin, LI Taoshen. Human-Object Interaction Detection Based on Fine-grained Attention Mechanism [J]. Computer Science, 2025, 52(11): 141-149.
[11] LI Xiaoyu, QIAN Yi, WEN Yimin, MIU Yuqing. Multi-level Feature Fusion Image Emotion Recognition Based on Color Enhancement [J]. Computer Science, 2025, 52(11): 157-165.
[12] WANG Yang, WANG Guodong, ZHAO Junli, SHENG Xiaomeng. Neural Radiance Field for Human Reconstruction Based on Multi-scale Hierarchical Network [J]. Computer Science, 2025, 52(11): 175-183.
[13] WANG Xiaofeng, HUANG Junjun, TAN Wenya, SHEN Zixuan. Object Detection Based on Deep Feature Enhancement and Path Aggregation Optimization [J]. Computer Science, 2025, 52(11): 184-195.
[14] GU Chengjie, MENG Yi, ZHU Dongjun, ZHANG Junjun. Medical Image Target Detection Method Based on Multi-branch Attention and Deep Down- sampling [J]. Computer Science, 2025, 52(11): 196-205.
[15] LIN Zukai, HOU Guojia, WANG Guodong, PAN Zhenkuan. Image Deraining Based on Union Attention Mechanism and Multi-stage Feature Extraction [J]. Computer Science, 2025, 52(11): 206-212.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!