FGAN: Federated Generative Adversarial Networks for Anomaly Detection in
Network Traffic
- URL: http://arxiv.org/abs/2203.11106v1
- Date: Mon, 21 Mar 2022 16:32:44 GMT
- Title: FGAN: Federated Generative Adversarial Networks for Anomaly Detection in
Network Traffic
- Authors: Sankha Das
- Abstract summary: This work aims at tackling two issues by using GANs in a federated architecture in networks of such scale and capacity.
The dataset required to train these models has to be made centrally available and publicly accessible.
In such a setting, different users of the network will be able to train and customize a centrally available adversarial model according to their own frequently faced conditions.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Over the last two decades, a lot of work has been done in improving network
security, particularly in intrusion detection systems (IDS) and anomaly
detection. Machine learning solutions have also been employed in IDSs to detect
known and plausible attacks in incoming traffic. Parameters such as packet
contents, sender IP and sender port, connection duration, etc. have been
previously used to train these machine learning models to learn to
differentiate genuine traffic from malicious ones. Generative Adversarial
Networks (GANs) have been significantly successful in detecting such anomalies,
mostly attributed to the adversarial training of the generator and
discriminator in an attempt to bypass each other and in turn increase their own
power and accuracy. However, in large networks having a wide variety of traffic
at possibly different regions of the network and susceptible to a large number
of potential attacks, training these GANs for a particular kind of anomaly may
make it oblivious to other anomalies and attacks. In addition, the dataset
required to train these models has to be made centrally available and publicly
accessible, posing the obvious question of privacy of the communications of the
respective participants of the network. The solution proposed in this work aims
at tackling the above two issues by using GANs in a federated architecture in
networks of such scale and capacity. In such a setting, different users of the
network will be able to train and customize a centrally available adversarial
model according to their own frequently faced conditions. Simultaneously, the
member users of the network will also able to gain from the experiences of the
other users in the network.
Related papers
- KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation [0.0]
We propose a knowledge-infused Generative Adversarial Network for generating synthetic network activity data (KiNETGAN)
Our approach enhances the resilience of distributed intrusion detection while addressing privacy concerns.
arXiv Detail & Related papers (2024-05-26T08:02:02Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Using EBGAN for Anomaly Intrusion Detection [13.155954231596434]
We propose an EBGAN-based intrusion detection method, IDS-EBGAN, that classifies network records as normal traffic or malicious traffic.
The generator in IDS-EBGAN is responsible for converting the original malicious network traffic in the training set into adversarial malicious examples.
During testing, IDS-EBGAN uses reconstruction error of discriminator to classify traffic records.
arXiv Detail & Related papers (2022-06-21T13:49:34Z) - Explainable Adversarial Attacks in Deep Neural Networks Using Activation
Profiles [69.9674326582747]
This paper presents a visual framework to investigate neural network models subjected to adversarial examples.
We show how observing these elements can quickly pinpoint exploited areas in a model.
arXiv Detail & Related papers (2021-03-18T13:04:21Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Few-shot Network Anomaly Detection via Cross-network Meta-learning [45.8111239825361]
We propose a new family of graph neural networks -- Graph Deviation Networks (GDN)
GDN can leverage a small number of labeled anomalies for enforcing statistically significant deviations between abnormal and normal nodes on a network.
We equip the proposed GDN with a new cross-network meta-learning algorithm to realize few-shot network anomaly detection.
arXiv Detail & Related papers (2021-02-22T16:42:37Z) - Adversarial Attacks on Deep Learning Based Power Allocation in a Massive
MIMO Network [62.77129284830945]
We show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network.
We benchmark the performance of these attacks and show that with a small perturbation in the input of the neural network (NN), the white-box attacks can result in infeasible solutions up to 86%.
arXiv Detail & Related papers (2021-01-28T16:18:19Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Machine Learning based Anomaly Detection for 5G Networks [0.0]
This paper proposes SDS (Software Defined Security) as a means to provide an automated, flexible and scalable network defence system.
SDS will harness current advances in machine learning to design a CNN (Convolutional Neural Network) using NAS (Neural Architecture Search) to detect anomalous network traffic.
arXiv Detail & Related papers (2020-03-07T00:17:08Z) - Distributed Learning in Ad-Hoc Networks: A Multi-player Multi-armed
Bandit Framework [0.0]
Next-generation networks are expected to be ultra-dense with a very high peak rate but relatively lower expected traffic per user.
To overcome this problem, cognitive ad-hoc networks (CAHN) that share spectrum with other networks are being envisioned.
We discuss state-of-the-art multi-armed multi-player bandit based distributed learning algorithms that allow users to adapt to the environment.
arXiv Detail & Related papers (2020-03-06T18:11:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.