In recent years, with the rapid development of Internet services in all walks of life, a large number of malicious acts such as network attacks, data leakage, and information theft have become major challenges for network security. Due to the difficulty of malicious traffic collection and labeling, the distribution of various samples in the existing dataset is seriously imbalanced, resulting in low accuracy of malicious traffic classification based on machine learning and deep learning, and poor model generalization ability. In this paper, a feature image representation method and Adversarial Generative Network with Filter (Filter-GAN) are proposed to solve these problems. First, the feature image representation method divides the original ...
For efficient malware removal, determination of malware threat levels, and damage estimation, malwar...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
Deep learning is successful in providing adequate classification results in the field of traffic cla...
Most machine learning algorithms only have a good recognition rate on balanced datasets. However, in...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
Existing generative adversarial networks (GANs), primarily used for creating fake image samples from...
Abstract Traditional network intrusion detection methods lack the ability of automatic feature extra...
Generating network traffic flows remains a critical aspect of developing cyber and network security ...
Intrusion detection and prevention are two of the most important issues to solve in network security...
Existing generative adversarial networks (GANs), primarily used for creating fake image samples from...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
Generative Adversarial Networks (GANs) have seen significant interest since their introduction in 20...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
Malware detection and analysis are important topics in cybersecurity. For efficient malware removal,...
For efficient malware removal, determination of malware threat levels, and damage estimation, malwar...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
Deep learning is successful in providing adequate classification results in the field of traffic cla...
Most machine learning algorithms only have a good recognition rate on balanced datasets. However, in...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
Existing generative adversarial networks (GANs), primarily used for creating fake image samples from...
Abstract Traditional network intrusion detection methods lack the ability of automatic feature extra...
Generating network traffic flows remains a critical aspect of developing cyber and network security ...
Intrusion detection and prevention are two of the most important issues to solve in network security...
Existing generative adversarial networks (GANs), primarily used for creating fake image samples from...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
Generative Adversarial Networks (GANs) have seen significant interest since their introduction in 20...
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
Malware detection and analysis are important topics in cybersecurity. For efficient malware removal,...
For efficient malware removal, determination of malware threat levels, and damage estimation, malwar...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
Deep learning is successful in providing adequate classification results in the field of traffic cla...