Open Access iconOpen Access

ARTICLE

crossmark

Optimized Generative Adversarial Networks for Adversarial Sample Generation

Daniyal M. Alghazzawi1, Syed Hamid Hasan1,*, Surbhi Bhatia2

1 Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
2 Department of Information Systems, College of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia

* Corresponding Author: Syed Hamid Hasan. Email: email

Computers, Materials & Continua 2022, 72(2), 3877-3897. https://doi.org/10.32604/cmc.2022.024613

Abstract

Detecting the anomalous entity in real-time network traffic is a popular area of research in recent times. Very few researches have focused on creating malware that fools the intrusion detection system and this paper focuses on this topic. We are using Deep Convolutional Generative Adversarial Networks (DCGAN) to trick the malware classifier to believe it is a normal entity. In this work, a new dataset is created to fool the Artificial Intelligence (AI) based malware detectors, and it consists of different types of attacks such as Denial of Service (DoS), scan 11, scan 44, botnet, spam, User Datagram Portal (UDP) scan, and ssh scan. The discriminator used in the DCGAN discriminates two different attack classes (anomaly and synthetic) and one normal class. The model collapse, instability, and vanishing gradient issues associated with the DCGAN are overcome using the proposed hybrid Aquila optimizer-based Mine blast harmony search algorithm (AO-MBHS). This algorithm helps the generator to create realistic malware samples to be undetected by the discriminator. The performance of the proposed methodology is evaluated using different performance metrics such as training time, detection rate, F-Score, loss function, Accuracy, False alarm rate, etc. The superiority of the hybrid AO-MBHS based DCGAN model is noticed when the detection rate is changed to 0 after the retraining method to make the defensive technique hard to be noticed by the malware detection system. The support vector machines (SVM) is used as the malicious traffic detection application and its True positive rate (TPR) goes from 80% to 0% after retraining the proposed model which shows the efficiency of the proposed model in hiding the samples.

Keywords


Cite This Article

APA Style
Alghazzawi, D.M., Hasan, S.H., Bhatia, S. (2022). Optimized generative adversarial networks for adversarial sample generation. Computers, Materials & Continua, 72(2), 3877-3897. https://doi.org/10.32604/cmc.2022.024613
Vancouver Style
Alghazzawi DM, Hasan SH, Bhatia S. Optimized generative adversarial networks for adversarial sample generation. Comput Mater Contin. 2022;72(2):3877-3897 https://doi.org/10.32604/cmc.2022.024613
IEEE Style
D.M. Alghazzawi, S.H. Hasan, and S. Bhatia, “Optimized Generative Adversarial Networks for Adversarial Sample Generation,” Comput. Mater. Contin., vol. 72, no. 2, pp. 3877-3897, 2022. https://doi.org/10.32604/cmc.2022.024613



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1717

    View

  • 723

    Download

  • 0

    Like

Share Link