Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network attack traffic generation method based on auxiliary classification type generative adversarial network

A network attack and network traffic technology, applied in the field of network attack traffic generation based on auxiliary classified generation confrontation network, can solve complex industrial application scenarios where simulation performance needs to be improved, virtual devices cannot be provided by users, and the number of modeling and simulations is limited, etc. problem, to achieve the effect of guaranteeing stability, high accuracy, and speeding up training

Active Publication Date: 2021-07-23
BEIJING UNIV OF POSTS & TELECOMM +2
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional network simulation tools (such as Cloudsim, OPNET, etc.) traffic modeling methods focus on application-specific traffic models and simplified traffic mixes, and cannot provide users with more information about virtual device data generation parameters and parameters according to the needs of different industrial application scenarios. Network parameter configuration
Moreover, it generally only supports modeling and simulation of a limited number of virtual devices and specific network environments, and the simulation performance of complex industrial application scenarios needs to be improved.
At the same time, these simulation tools consume too much time in the actual simulation process. The simulation of a simple application scenario may take a very long time because there is no simulation time compression mechanism, and the simulation efficiency is obviously insufficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack traffic generation method based on auxiliary classification type generative adversarial network
  • Network attack traffic generation method based on auxiliary classification type generative adversarial network
  • Network attack traffic generation method based on auxiliary classification type generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with specific embodiments and accompanying drawings.

[0026] The generation flow chart that the present invention uses when training is as figure 1 As shown in , the standard format of the fusion file of multi-source heterogeneous traffic data is as follows Figure 4 As shown, the specific steps of the multi-source heterogeneous network traffic fusion stage described in the present invention are as follows:

[0027] Step 101: Cut the original network data samples in different formats into network sessions according to the quintuple of the network layer protocol.

[0028] Step 102: Perform packet filtering to remove part of the data in the MAC packet in the original data packet.

[0029] Step 103: Determine the size of the payload data obtained after filtering, perform truncation proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack traffic generation method based on an auxiliary classification type generative adversarial network, and the method can generate a malicious traffic sample which can cheat and escape from the detection of a defense system according to an existing network attack traffic data set sample by utilizing the principle of the generative adversarial network. The system comprises: a multi-source heterogeneous data fusion processing module which is responsible for defining a unified data format; a generator network which is responsible for generating a network statistical flow sample according to Gaussian noise and feedback from the discriminator; a discriminator network which is responsible for analyzing the attack traffic sample generated by the generator and the original network traffic sample, including authenticity analysis and attack traffic category analysis; and a classification fine tuning module which is responsible for debugging the performance of the generation model for generating specific types of traffic samples. According to the method, the network attack traffic generation model based on the auxiliary classification type generative adversarial network is constructed, the network attack traffic sample of a specific type can be generated according to the type of the network attack when the network traffic is generated, and the network attack can be simulated by generating the adversarial sample to detect the robustness of the existing intrusion detection system, and a new thought is provided for the existing traffic generator.

Description

technical field [0001] The invention relates to the fields of network security and industrial Internet network simulation, and specifically designs a method for generating network attack traffic based on an auxiliary classified generation confrontation network. Background technique [0002] With the continuous deepening of the research and application of the industrial Internet architecture, the key role of the traffic model in line with the actual situation in the performance evaluation of the new network architecture has become more and more obvious. The construction of complex multi-industry industrial Internet traffic characteristics security Testing traffic simulators is imperative. [0003] Due to the complex industrial Internet application scenarios, numerous dedicated protocols, and huge traffic data scale, in order to ensure the security of industrial Internet equipment, control, network, platform, and data, it is necessary to strengthen the security testing work fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/18G06F30/27G06K9/62G06N3/04G06N3/08H04L12/24G06F111/02G06F111/08G06F119/10
CPCG06F30/18G06F30/27G06N3/08H04L41/145G06F2111/02G06F2111/08G06F2119/10G06N3/045G06F18/24Y02D30/50
Inventor 张茹吕智帅刘建毅胡威李静曲延盛王婵
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products