Skip to main content

Generative Adversarial Network for Detecting Cyber Threats in Industrial Systems

  • Conference paper
  • First Online:
Proceedings of International Scientific Conference on Telecommunications, Computing and Control

Abstract

The transition from the information economy to the digital presents new challenges to the community related to the development of breakthrough technologies, a network of cyber-physical systems, artificial intelligence, and big data. When creating digital platforms, a number of difficulties arise: the large dimension of the digital infrastructure and its heterogeneity, poorly established information interaction between the segments, the lack of a common approach to ensuring cybersecurity, and high dependence on personnel qualification and reliability of equipment. The introduction of the digital economy leads to an increase in the risk of cyber threats associated with problems of access control between systems, regulation of information, and control flows. In this paper, for solving cyber threat detection tasks, it is proposed to use generative adversarial neural networks. The paper presents training and testing algorithms of the neural network. The result of the experiments demonstrated high accuracy at cyber threat detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. World Economic Forum: The Fourth Industrial Revolution Davos 2016. https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-itmeans-and-how-to-respond. Last accessed 2019/09/05

  2. Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, pp. 10–21, Norway (2012)

    Google Scholar 

  3. Baltimore’s 911 Emergency System Hit by Cyberattack. https://www.nbcnews.com/news/us-news/baltimore-s-911-emergency-system-hitcyberattack-n860876. Last accessed 2019/09/05

  4. Goncharov, E.: Challenges of Industrial Cybersecurity. https://ics-cert.kaspersky.com/reports/2019/01/17/challenges-of-industrial-cybersecurity/. Last accessed 2019/09/05

  5. Berman, D., Buczak, A., Chavis, J., Corbett, C.: A survey of deep learning methods for cyber security. Information 10, 122 (2019)

    Article  Google Scholar 

  6. Igor, H., Bohuslava, J., Martin, J., Martin, N.: Application of neural networks in computer security. Procedia Eng. 69, 1209–1215 (2013)

    Article  Google Scholar 

  7. Swarup, K.: Artificial neural network using pattern recognition for security assessment and analysis. Neurocomputing 71(4–6), 983–998 (2008)

    Google Scholar 

  8. Deng, L., et al.: Recent advances in deep learning for speech research at Microsoft. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8604–8608, Vancouver (2013)

    Google Scholar 

  9. With QuickType: Apple wants to do more than guess your next text. It wants to give you an AI. https://www.wired.com/2016/06/apple-bringing-ai-revolution-iphone/. Last accessed 2019/09/05

  10. Xiong, W., Wu, L., Alleva, F., Droppo, J., Huang, X., Stolcke, A.: The Microsoft 2017 Conversational Speech Recognition System [Technical Report]. https://www.microsoft.com/en-us/research/publication/microsoft-2017-conversational-speech-recognition-system/. Last accessed 2019/09/05

  11. Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672–2680 (2014)

    Google Scholar 

  12. Hui, J.: Why it is so hard to train generative adversarial networks! Medium. Data Sci. (2018)

    Google Scholar 

  13. Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al.: Generative adversarial nets. Int. J. Eng. Trends Technol. (IJETT) (2015)

    Google Scholar 

  14. Mustafaev, A.: Neirosetevaya sistema obnaruzheniya kompyuternyh atak na osnove analyza setevogo trafika. Voprosy bezopasnosti. 2016. № 2, pp. 1–7 (2016)

    Google Scholar 

  15. Halenar, I., et al.: Application of neural networks in computer security (2013)

    Google Scholar 

  16. Govindarajan, M., Chandrasekaran, R.: A hybrid multilayer perceptron neural network for direct marketing (2014)

    Google Scholar 

  17. Gallant, S.: Perceptron-based learning algorithms. IEEE Trans. Neural Netw. 1(2), 179–191 (1990)

    Article  Google Scholar 

  18. KDD Cup 1999: https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Last accessed 2019/09/05

  19. Zhang, H., Huang, Q., Fangwei, L., Jiang, Z.: A network security situation prediction model based on wavelet neural network with optimized parameters. Digital Commun. Netw. 2(3), 139–144 (2016)

    Google Scholar 

  20. Kang, M., Kang, J.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016). https://doi.org/10.1371/journal.pone.0155781

  21. Emilianova, U., Talalaev, A., et al.: Neyrosetevaya tehnologiya obnaruzheniya setevyh atak na informacionnye resursy. Programmnye sistemy: teoriya I prilozheniya 3(7), 3–15 (2011)

    Google Scholar 

  22. Kornev, P., Pylkin, A., Sviridov, A.: Using artificial intelligence in intrusion detection systems (2015)

    Google Scholar 

  23. Zhang, Y., Gan, Z., Fan, K., Chen, Z., Henao, R., Shen, D., Carin, L.: Adversarial feature matching for text generation. arXiv preprint arXiv:1706.03850 (2017)

  24. Schlegl, T., Seeböck, P., Waldstein, S., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International Conference on Information Processing in Medical Imaging, pp. 146–157. Springer, Cham (2017)

    Google Scholar 

  25. Zenati, H., Foo, C., Lecouat, B., Manek, G., Chandrasekhar, V.: Efficient GAN-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018)

  26. Donahue, J., Krähenbühl, P., Darrell, T.: Adversarial feature learning. arXiv preprint arXiv:1605.09782 (2016)

  27. Zheng, Y., Zhou, X., Sheng, W., Xue, Y., Chen, S.: Generative adversarial network based telecom fraud detection at the receiving bank. Neural Netw. (2018)

    Google Scholar 

  28. Pavlenko, E., Zegzhda, D.: Sustainability of cyber-physical systems in the context of targeted destructive influences. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, pp. 830–834 (2018)

    Google Scholar 

  29. Lavrova, D., Poltavtseva, M., Shtyrkina, A., Zegzhda, P.: Detection of cyber threats to network infrastructure of digital production based on the methods of Big Data and multifractal analysis of traffic. In: SHS Web of Conferences, vol. 44, p. 00007, CC-TESC2018WoS (2018)

    Google Scholar 

  30. Keras: https://keras.io/. Last accessed 2019/09/05

  31. Shulga, D.: Exploring Activation Functions for Neural Networks (2017)

    Google Scholar 

  32. Brownlee, J.: Gentle Introduction to the Adam Optimization Algorithm for Deep Learning (2017)

    Google Scholar 

  33. Network Simulator NS-3: https://www.nsnam.org/. Last accessed 2019/09/05

Download references

Acknowledgements

The work was funded by the Russian Federation Presidential grants for support of young scientists and postgraduate students (SP-443.2019.5).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasiliy Krundyshev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krundyshev, V., Kalinin, M. (2021). Generative Adversarial Network for Detecting Cyber Threats in Industrial Systems. In: Voinov, N., Schreck, T., Khan, S. (eds) Proceedings of International Scientific Conference on Telecommunications, Computing and Control. Smart Innovation, Systems and Technologies, vol 220. Springer, Singapore. https://doi.org/10.1007/978-981-33-6632-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6632-9_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6631-2

  • Online ISBN: 978-981-33-6632-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics