{"id":"https://openalex.org/W3093587019","doi":"https://doi.org/10.1109/iscc50000.2020.9219561","title":"Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks","display_name":"Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093587019","doi":"https://doi.org/10.1109/iscc50000.2020.9219561","mag":"3093587019"},"language":"en","primary_location":{"id":"doi:10.1109/iscc50000.2020.9219561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219561","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100745770","display_name":"Zhicheng Liu","orcid":"https://orcid.org/0000-0002-6278-1813"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhicheng Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100706214","display_name":"Shuhao Li","orcid":"https://orcid.org/0000-0001-6071-5284"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuhao Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100715816","display_name":"Yongzheng Zhang","orcid":"https://orcid.org/0009-0000-1077-3849"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzheng Zhang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028040417","display_name":"Xiaochun Yun","orcid":"https://orcid.org/0000-0003-2849-1086"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochun Yun","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005892660","display_name":"Zhenyu Cheng","orcid":"https://orcid.org/0000-0003-3292-7428"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyu Cheng","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100745770"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.8501,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.86724966,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8391846418380737},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.77279132604599},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.7467560768127441},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5970775485038757},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.5407149791717529},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49114248156547546},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4875999987125397},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4831070899963379},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.4797612130641937},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.42310044169425964},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38099777698516846},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3689708709716797}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8391846418380737},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77279132604599},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.7467560768127441},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5970775485038757},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.5407149791717529},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49114248156547546},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4875999987125397},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4831070899963379},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.4797612130641937},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.42310044169425964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38099777698516846},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3689708709716797},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc50000.2020.9219561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219561","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W70584117","https://openalex.org/W1481472066","https://openalex.org/W1827212170","https://openalex.org/W2018175892","https://openalex.org/W2099471712","https://openalex.org/W2133665775","https://openalex.org/W2144762488","https://openalex.org/W2145969515","https://openalex.org/W2531850825","https://openalex.org/W2540219012","https://openalex.org/W2606697812","https://openalex.org/W2607328788","https://openalex.org/W2796849954","https://openalex.org/W2804769055","https://openalex.org/W2884020303","https://openalex.org/W2982485713","https://openalex.org/W2983248864","https://openalex.org/W4320013936","https://openalex.org/W6602816918","https://openalex.org/W6628600657","https://openalex.org/W6638623425","https://openalex.org/W6749931093"],"related_works":["https://openalex.org/W4396941953","https://openalex.org/W2987280934","https://openalex.org/W2888032422","https://openalex.org/W2996316059","https://openalex.org/W4377980832","https://openalex.org/W2897769091","https://openalex.org/W2845413374","https://openalex.org/W3005996785","https://openalex.org/W4297411772","https://openalex.org/W4235873501"],"abstract_inverted_index":{"With":[0],"the":[1,8,39,46,97,118,128,134,144,147,155,161,169,196],"booming":[2],"of":[3,10,87,136,146,157,198],"malware-based":[4],"cyber-security":[5],"incidents":[6],"and":[7,24,77,93,123,153,172,191],"sophistication":[9],"attacks,":[11],"previous":[12],"detections":[13],"based":[14,32,60],"on":[15,33,38,61,168],"malware":[16,51,88],"sample":[17],"analysis":[18,26,35],"appear":[19],"powerless":[20],"due":[21],"to":[22,65,73,83,96,116,149,188],"time-consuming":[23],"labor-intensive":[25],"process.":[27],"The":[28,179],"existing":[29],"detection":[30],"methods":[31,190],"traffic":[34,41,71,85,122,125],"rely":[36],"heavily":[37],"available":[40],"patterns,":[42],"which":[43,68,142],"hinder":[44],"detecting":[45],"zero-day":[47,151],"attacks":[48,152],"caused":[49],"by":[50,90,126,138],"variants.":[52],"In":[53],"this":[54],"paper,":[55],"we":[56,112,132],"propose":[57],"an":[58],"approach":[59],"deep":[62],"learning":[63],"referred":[64],"as":[66],"TrafficGAN,":[67],"analyzes":[69],"(HTTP)":[70],"sessions":[72],"distinguish":[74],"between":[75,120],"malware-related":[76],"normal":[78,124],"traffic.":[79,109],"We":[80,164],"first":[81],"try":[82],"explore":[84],"patterns":[86],"variants":[89],"adding":[91],"noise":[92],"category":[94],"condition":[95],"Generative":[98],"Adversarial":[99],"Networks":[100],"(GAN),":[101],"thus":[102],"generating":[103,139],"various":[104],"similar":[105],"but":[106],"slightly":[107],"different":[108],"And":[110],"then,":[111],"use":[113],"discriminative":[114],"model":[115],"seek":[117],"deviation":[119],"abnormal":[121],"extracting":[127],"essential":[129],"difference.":[130],"Notablely,":[131],"increase":[133],"diversity":[135],"data":[137,159,174],"samples":[140],"adversarially,":[141],"enhances":[143],"robustness":[145],"system":[148],"detect":[150],"highlights":[154],"lack":[156],"sensitive":[158],"in":[160],"security":[162],"community.":[163],"conduct":[165],"extensive":[166],"experiments":[167],"public":[170],"dataset":[171],"our":[173,183],"collected":[175],"for":[176],"specific":[177,193],"targets.":[178],"results":[180],"demonstrate":[181],"that":[182],"method":[184],"achieves":[185],"superior":[186],"performance":[187],"other":[189],"protects":[192],"targets":[194],"from":[195],"susceptibility":[197],"malware.":[199]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
