Generating network traffic flows remains a critical aspect of developing cyber and network security systems. In this survey, we first consider the history of network traffic generation methods and identify the weaknesses of these. We then proceed to introduce more recent approaches based on machine learning (ML) models. In particular, we focus on Generative Adversarial Network (GAN) models, which have developed from their initial form to encompass many variants in today’s ML landscape. The use of GANs for generating traffic flows that have appeared in the literature are then presented. For each instance, we present the architecture, training methods, generated results, identified limitations and prospects for further research. We thus demon...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
This thesis aims to design a neural network (NN), that is capable of discriminating if a network flo...
Existing generative adversarial networks (GANs), primarily used for creating fake image samples from...
Despite the recency of their conception, Generative Adversarial Networks (GANs) constitute an extens...
Despite the recency of their conception, Generative Adversarial Networks (GANs) constitute an extens...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
Intrusion detection and prevention are two of the most important issues to solve in network security...
Generative Adversarial Networks (GANs) have seen significant interest since their introduction in 20...
Due to the growing rise of cyber attacks in the Internet, the demand of accurate intrusion detection...
In recent years, with the rapid development of Internet services in all walks of life, a large numbe...
Machine Learning (ML) has proven to be effective in many application domains. However, ML methods ca...
Master's thesis Information- and communication technology IKT590 - University of Agder 2018Over the ...
Project Work presented as the partial requirement for obtaining a Master's degree in Data Science a...
Most machine learning algorithms only have a good recognition rate on balanced datasets. However, in...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
This thesis aims to design a neural network (NN), that is capable of discriminating if a network flo...
Existing generative adversarial networks (GANs), primarily used for creating fake image samples from...
Despite the recency of their conception, Generative Adversarial Networks (GANs) constitute an extens...
Despite the recency of their conception, Generative Adversarial Networks (GANs) constitute an extens...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
Intrusion detection and prevention are two of the most important issues to solve in network security...
Generative Adversarial Networks (GANs) have seen significant interest since their introduction in 20...
Due to the growing rise of cyber attacks in the Internet, the demand of accurate intrusion detection...
In recent years, with the rapid development of Internet services in all walks of life, a large numbe...
Machine Learning (ML) has proven to be effective in many application domains. However, ML methods ca...
Master's thesis Information- and communication technology IKT590 - University of Agder 2018Over the ...
Project Work presented as the partial requirement for obtaining a Master's degree in Data Science a...
Most machine learning algorithms only have a good recognition rate on balanced datasets. However, in...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
This thesis aims to design a neural network (NN), that is capable of discriminating if a network flo...
Existing generative adversarial networks (GANs), primarily used for creating fake image samples from...