Abstract
The transition from the information economy to the digital presents new challenges to the community related to the development of breakthrough technologies, a network of cyber-physical systems, artificial intelligence, and big data. When creating digital platforms, a number of difficulties arise: the large dimension of the digital infrastructure and its heterogeneity, poorly established information interaction between the segments, the lack of a common approach to ensuring cybersecurity, and high dependence on personnel qualification and reliability of equipment. The introduction of the digital economy leads to an increase in the risk of cyber threats associated with problems of access control between systems, regulation of information, and control flows. In this paper, for solving cyber threat detection tasks, it is proposed to use generative adversarial neural networks. The paper presents training and testing algorithms of the neural network. The result of the experiments demonstrated high accuracy at cyber threat detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
World Economic Forum: The Fourth Industrial Revolution Davos 2016. https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-itmeans-and-how-to-respond. Last accessed 2019/09/05
Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, pp. 10–21, Norway (2012)
Baltimore’s 911 Emergency System Hit by Cyberattack. https://www.nbcnews.com/news/us-news/baltimore-s-911-emergency-system-hitcyberattack-n860876. Last accessed 2019/09/05
Goncharov, E.: Challenges of Industrial Cybersecurity. https://ics-cert.kaspersky.com/reports/2019/01/17/challenges-of-industrial-cybersecurity/. Last accessed 2019/09/05
Berman, D., Buczak, A., Chavis, J., Corbett, C.: A survey of deep learning methods for cyber security. Information 10, 122 (2019)
Igor, H., Bohuslava, J., Martin, J., Martin, N.: Application of neural networks in computer security. Procedia Eng. 69, 1209–1215 (2013)
Swarup, K.: Artificial neural network using pattern recognition for security assessment and analysis. Neurocomputing 71(4–6), 983–998 (2008)
Deng, L., et al.: Recent advances in deep learning for speech research at Microsoft. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8604–8608, Vancouver (2013)
With QuickType: Apple wants to do more than guess your next text. It wants to give you an AI. https://www.wired.com/2016/06/apple-bringing-ai-revolution-iphone/. Last accessed 2019/09/05
Xiong, W., Wu, L., Alleva, F., Droppo, J., Huang, X., Stolcke, A.: The Microsoft 2017 Conversational Speech Recognition System [Technical Report]. https://www.microsoft.com/en-us/research/publication/microsoft-2017-conversational-speech-recognition-system/. Last accessed 2019/09/05
Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672–2680 (2014)
Hui, J.: Why it is so hard to train generative adversarial networks! Medium. Data Sci. (2018)
Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al.: Generative adversarial nets. Int. J. Eng. Trends Technol. (IJETT) (2015)
Mustafaev, A.: Neirosetevaya sistema obnaruzheniya kompyuternyh atak na osnove analyza setevogo trafika. Voprosy bezopasnosti. 2016. № 2, pp. 1–7 (2016)
Halenar, I., et al.: Application of neural networks in computer security (2013)
Govindarajan, M., Chandrasekaran, R.: A hybrid multilayer perceptron neural network for direct marketing (2014)
Gallant, S.: Perceptron-based learning algorithms. IEEE Trans. Neural Netw. 1(2), 179–191 (1990)
KDD Cup 1999: https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Last accessed 2019/09/05
Zhang, H., Huang, Q., Fangwei, L., Jiang, Z.: A network security situation prediction model based on wavelet neural network with optimized parameters. Digital Commun. Netw. 2(3), 139–144 (2016)
Kang, M., Kang, J.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016). https://doi.org/10.1371/journal.pone.0155781
Emilianova, U., Talalaev, A., et al.: Neyrosetevaya tehnologiya obnaruzheniya setevyh atak na informacionnye resursy. Programmnye sistemy: teoriya I prilozheniya 3(7), 3–15 (2011)
Kornev, P., Pylkin, A., Sviridov, A.: Using artificial intelligence in intrusion detection systems (2015)
Zhang, Y., Gan, Z., Fan, K., Chen, Z., Henao, R., Shen, D., Carin, L.: Adversarial feature matching for text generation. arXiv preprint arXiv:1706.03850 (2017)
Schlegl, T., Seeböck, P., Waldstein, S., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International Conference on Information Processing in Medical Imaging, pp. 146–157. Springer, Cham (2017)
Zenati, H., Foo, C., Lecouat, B., Manek, G., Chandrasekhar, V.: Efficient GAN-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018)
Donahue, J., Krähenbühl, P., Darrell, T.: Adversarial feature learning. arXiv preprint arXiv:1605.09782 (2016)
Zheng, Y., Zhou, X., Sheng, W., Xue, Y., Chen, S.: Generative adversarial network based telecom fraud detection at the receiving bank. Neural Netw. (2018)
Pavlenko, E., Zegzhda, D.: Sustainability of cyber-physical systems in the context of targeted destructive influences. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, pp. 830–834 (2018)
Lavrova, D., Poltavtseva, M., Shtyrkina, A., Zegzhda, P.: Detection of cyber threats to network infrastructure of digital production based on the methods of Big Data and multifractal analysis of traffic. In: SHS Web of Conferences, vol. 44, p. 00007, CC-TESC2018WoS (2018)
Keras: https://keras.io/. Last accessed 2019/09/05
Shulga, D.: Exploring Activation Functions for Neural Networks (2017)
Brownlee, J.: Gentle Introduction to the Adam Optimization Algorithm for Deep Learning (2017)
Network Simulator NS-3: https://www.nsnam.org/. Last accessed 2019/09/05
Acknowledgements
The work was funded by the Russian Federation Presidential grants for support of young scientists and postgraduate students (SP-443.2019.5).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Krundyshev, V., Kalinin, M. (2021). Generative Adversarial Network for Detecting Cyber Threats in Industrial Systems. In: Voinov, N., Schreck, T., Khan, S. (eds) Proceedings of International Scientific Conference on Telecommunications, Computing and Control. Smart Innovation, Systems and Technologies, vol 220. Springer, Singapore. https://doi.org/10.1007/978-981-33-6632-9_1
Download citation
DOI: https://doi.org/10.1007/978-981-33-6632-9_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6631-2
Online ISBN: 978-981-33-6632-9
eBook Packages: EngineeringEngineering (R0)