Skip to main content

Generation of Similar Traffic Using GAN for Resolving Data Imbalance

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing (CUTE 2018, CSA 2018)

Abstract

Recently, as the practical application of deep learning has become possible, research on the problems pertaining to intrusion detection has increased.

However, it is difficult to detect a small number of attack traffic when the real network is connected to produce an imbalance between the attack traffic class data and the normal traffic data necessary for learning. In this study, we propose a method to improve the accuracy of attack traffic data detection by creating similar attack traffic, using a Generative Adversarial Network (GAN) algorithm of deep learning. The proposed method generates similar attack traffic for NSL–KDD, ISCX 2012, and USTC_TFC 2016 datasets, which are well-known intrusion detection learning data sets. Experiments have shown that the data imbalance in each data set can improve classification accuracy by 10–12%, owing to the degradation problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA) (2009)

    Google Scholar 

  2. Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012). ISSN 0167-4048. https://doi.org/10.1016/j.cose.2011.12.012

    Article  Google Scholar 

  3. Wang, W., et al.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN). IEEE (2017)

    Google Scholar 

  4. Yao, H.P., Liu, Y.Q., Fang, C.: An abnormal network traffic detection algorithm based on big data analysis. Int. J. Comput. Commun. Control 11(4), 720–733 (2016)

    Article  Google Scholar 

  5. Rathore, M.M., Ahmad, A., Paul, A.: Real time intrusion detection system for ultra-high-speed big data environments. J. Supercomput. 72(9), 3489–3510 (2016)

    Article  Google Scholar 

  6. Tang, T.A., et al.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE (2016)

    Google Scholar 

  7. Mylavarapu, G., Thomas, J., Ashwin Kumar, T.K.: Real-time hybrid intrusion detection system using apache storm. In: High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE (2015)

    Google Scholar 

  8. Yu, Y., Long, J., Cai, Z.: Session-based network intrusion detection using a deep learning architecture. In: Modeling Decisions for Artificial Intelligence. Springer, Cham (2017)

    Chapter  Google Scholar 

  9. He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21(9), 1263–1284 (2009)

    Article  Google Scholar 

  10. Tavallaee, M., et al.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009. IEEE (2009)

    Google Scholar 

  11. Hariharan, B., Girshick, R.: Low-shot visual recognition by shrinking and hallucinating features. In: Proceedings of IEEE International Conference on Computer Vision (ICCV), Venice, Italy (2017)

    Google Scholar 

  12. DCGAN: Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Woo Ho Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, W.H., Lim, C.S., Noh, B.N. (2020). Generation of Similar Traffic Using GAN for Resolving Data Imbalance. In: Park, J., Park, DS., Jeong, YS., Pan, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2018 2018. Lecture Notes in Electrical Engineering, vol 536. Springer, Singapore. https://doi.org/10.1007/978-981-13-9341-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-9341-9_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-9340-2

  • Online ISBN: 978-981-13-9341-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics