Skip to main content
Top
Published in:
Cover of the book

2021 | OriginalPaper | Chapter

Generative Adversarial Network for Detecting Cyber Threats in Industrial Systems

Authors : Vasiliy Krundyshev, Maxim Kalinin

Published in: Proceedings of International Scientific Conference on Telecommunications, Computing and Control

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The transition from the information economy to the digital presents new challenges to the community related to the development of breakthrough technologies, a network of cyber-physical systems, artificial intelligence, and big data. When creating digital platforms, a number of difficulties arise: the large dimension of the digital infrastructure and its heterogeneity, poorly established information interaction between the segments, the lack of a common approach to ensuring cybersecurity, and high dependence on personnel qualification and reliability of equipment. The introduction of the digital economy leads to an increase in the risk of cyber threats associated with problems of access control between systems, regulation of information, and control flows. In this paper, for solving cyber threat detection tasks, it is proposed to use generative adversarial neural networks. The paper presents training and testing algorithms of the neural network. The result of the experiments demonstrated high accuracy at cyber threat detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, pp. 10–21, Norway (2012) Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, pp. 10–21, Norway (2012)
5.
go back to reference Berman, D., Buczak, A., Chavis, J., Corbett, C.: A survey of deep learning methods for cyber security. Information 10, 122 (2019)CrossRef Berman, D., Buczak, A., Chavis, J., Corbett, C.: A survey of deep learning methods for cyber security. Information 10, 122 (2019)CrossRef
6.
go back to reference Igor, H., Bohuslava, J., Martin, J., Martin, N.: Application of neural networks in computer security. Procedia Eng. 69, 1209–1215 (2013)CrossRef Igor, H., Bohuslava, J., Martin, J., Martin, N.: Application of neural networks in computer security. Procedia Eng. 69, 1209–1215 (2013)CrossRef
7.
go back to reference Swarup, K.: Artificial neural network using pattern recognition for security assessment and analysis. Neurocomputing 71(4–6), 983–998 (2008) Swarup, K.: Artificial neural network using pattern recognition for security assessment and analysis. Neurocomputing 71(4–6), 983–998 (2008)
8.
go back to reference Deng, L., et al.: Recent advances in deep learning for speech research at Microsoft. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8604–8608, Vancouver (2013) Deng, L., et al.: Recent advances in deep learning for speech research at Microsoft. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8604–8608, Vancouver (2013)
11.
go back to reference Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672–2680 (2014) Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672–2680 (2014)
12.
go back to reference Hui, J.: Why it is so hard to train generative adversarial networks! Medium. Data Sci. (2018) Hui, J.: Why it is so hard to train generative adversarial networks! Medium. Data Sci. (2018)
13.
go back to reference Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al.: Generative adversarial nets. Int. J. Eng. Trends Technol. (IJETT) (2015) Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al.: Generative adversarial nets. Int. J. Eng. Trends Technol. (IJETT) (2015)
14.
go back to reference Mustafaev, A.: Neirosetevaya sistema obnaruzheniya kompyuternyh atak na osnove analyza setevogo trafika. Voprosy bezopasnosti. 2016. № 2, pp. 1–7 (2016) Mustafaev, A.: Neirosetevaya sistema obnaruzheniya kompyuternyh atak na osnove analyza setevogo trafika. Voprosy bezopasnosti. 2016. № 2, pp. 1–7 (2016)
15.
go back to reference Halenar, I., et al.: Application of neural networks in computer security (2013) Halenar, I., et al.: Application of neural networks in computer security (2013)
16.
go back to reference Govindarajan, M., Chandrasekaran, R.: A hybrid multilayer perceptron neural network for direct marketing (2014) Govindarajan, M., Chandrasekaran, R.: A hybrid multilayer perceptron neural network for direct marketing (2014)
17.
go back to reference Gallant, S.: Perceptron-based learning algorithms. IEEE Trans. Neural Netw. 1(2), 179–191 (1990)CrossRef Gallant, S.: Perceptron-based learning algorithms. IEEE Trans. Neural Netw. 1(2), 179–191 (1990)CrossRef
19.
go back to reference Zhang, H., Huang, Q., Fangwei, L., Jiang, Z.: A network security situation prediction model based on wavelet neural network with optimized parameters. Digital Commun. Netw. 2(3), 139–144 (2016) Zhang, H., Huang, Q., Fangwei, L., Jiang, Z.: A network security situation prediction model based on wavelet neural network with optimized parameters. Digital Commun. Netw. 2(3), 139–144 (2016)
21.
go back to reference Emilianova, U., Talalaev, A., et al.: Neyrosetevaya tehnologiya obnaruzheniya setevyh atak na informacionnye resursy. Programmnye sistemy: teoriya I prilozheniya 3(7), 3–15 (2011) Emilianova, U., Talalaev, A., et al.: Neyrosetevaya tehnologiya obnaruzheniya setevyh atak na informacionnye resursy. Programmnye sistemy: teoriya I prilozheniya 3(7), 3–15 (2011)
22.
go back to reference Kornev, P., Pylkin, A., Sviridov, A.: Using artificial intelligence in intrusion detection systems (2015) Kornev, P., Pylkin, A., Sviridov, A.: Using artificial intelligence in intrusion detection systems (2015)
23.
go back to reference Zhang, Y., Gan, Z., Fan, K., Chen, Z., Henao, R., Shen, D., Carin, L.: Adversarial feature matching for text generation. arXiv preprint arXiv:1706.03850 (2017) Zhang, Y., Gan, Z., Fan, K., Chen, Z., Henao, R., Shen, D., Carin, L.: Adversarial feature matching for text generation. arXiv preprint arXiv:​1706.​03850 (2017)
24.
go back to reference Schlegl, T., Seeböck, P., Waldstein, S., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International Conference on Information Processing in Medical Imaging, pp. 146–157. Springer, Cham (2017) Schlegl, T., Seeböck, P., Waldstein, S., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International Conference on Information Processing in Medical Imaging, pp. 146–157. Springer, Cham (2017)
25.
go back to reference Zenati, H., Foo, C., Lecouat, B., Manek, G., Chandrasekhar, V.: Efficient GAN-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018) Zenati, H., Foo, C., Lecouat, B., Manek, G., Chandrasekhar, V.: Efficient GAN-based anomaly detection. arXiv preprint arXiv:​1802.​06222 (2018)
27.
go back to reference Zheng, Y., Zhou, X., Sheng, W., Xue, Y., Chen, S.: Generative adversarial network based telecom fraud detection at the receiving bank. Neural Netw. (2018) Zheng, Y., Zhou, X., Sheng, W., Xue, Y., Chen, S.: Generative adversarial network based telecom fraud detection at the receiving bank. Neural Netw. (2018)
28.
go back to reference Pavlenko, E., Zegzhda, D.: Sustainability of cyber-physical systems in the context of targeted destructive influences. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, pp. 830–834 (2018) Pavlenko, E., Zegzhda, D.: Sustainability of cyber-physical systems in the context of targeted destructive influences. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, pp. 830–834 (2018)
29.
go back to reference Lavrova, D., Poltavtseva, M., Shtyrkina, A., Zegzhda, P.: Detection of cyber threats to network infrastructure of digital production based on the methods of Big Data and multifractal analysis of traffic. In: SHS Web of Conferences, vol. 44, p. 00007, CC-TESC2018WoS (2018) Lavrova, D., Poltavtseva, M., Shtyrkina, A., Zegzhda, P.: Detection of cyber threats to network infrastructure of digital production based on the methods of Big Data and multifractal analysis of traffic. In: SHS Web of Conferences, vol. 44, p. 00007, CC-TESC2018WoS (2018)
31.
go back to reference Shulga, D.: Exploring Activation Functions for Neural Networks (2017) Shulga, D.: Exploring Activation Functions for Neural Networks (2017)
32.
go back to reference Brownlee, J.: Gentle Introduction to the Adam Optimization Algorithm for Deep Learning (2017) Brownlee, J.: Gentle Introduction to the Adam Optimization Algorithm for Deep Learning (2017)
Metadata
Title
Generative Adversarial Network for Detecting Cyber Threats in Industrial Systems
Authors
Vasiliy Krundyshev
Maxim Kalinin
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-33-6632-9_1