{"id":"https://openalex.org/W4406371502","doi":"https://doi.org/10.1145/3712307","title":"Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation","display_name":"Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation","publication_year":2025,"publication_date":"2025-01-14","ids":{"openalex":"https://openalex.org/W4406371502","doi":"https://doi.org/10.1145/3712307"},"language":"en","primary_location":{"id":"doi:10.1145/3712307","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3712307","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1145/3712307","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091899379","display_name":"Soumyadeep Hore","orcid":"https://orcid.org/0000-0002-9326-291X"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Soumyadeep Hore","raw_affiliation_strings":["Department of Industrial and Management Systems Engineering, University of South Florida, Tampa, United States"],"affiliations":[{"raw_affiliation_string":"Department of Industrial and Management Systems Engineering, University of South Florida, Tampa, United States","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046599630","display_name":"Jalal Ghadermazi","orcid":"https://orcid.org/0009-0000-7554-5740"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jalal Ghadermazi","raw_affiliation_strings":["Department of Industrial and Management Systems Engineering, University of South Florida, Tampa, United States"],"affiliations":[{"raw_affiliation_string":"Department of Industrial and Management Systems Engineering, University of South Florida, Tampa, United States","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091984934","display_name":"Diwas Paudel","orcid":"https://orcid.org/0000-0002-4290-7191"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Diwas Paudel","raw_affiliation_strings":["Department of Industrial and Management Systems Engineering, University of South Florida, Tampa, United States"],"affiliations":[{"raw_affiliation_string":"Department of Industrial and Management Systems Engineering, University of South Florida, Tampa, United States","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046576682","display_name":"Ankit Shah","orcid":"https://orcid.org/0000-0002-8314-6392"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]},{"id":"https://openalex.org/I4210164544","display_name":"Health Decision Technologies (United States)","ror":"https://ror.org/05mc59k43","country_code":"US","type":"company","lineage":["https://openalex.org/I4210164544"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ankit Shah","raw_affiliation_strings":["Department of Operations and Decision Technologies, Indiana University, Bloomington, United States","Operations and Decision Technologies, Kelley School of Business, Indiana University, Bloomington, United States"],"affiliations":[{"raw_affiliation_string":"Department of Operations and Decision Technologies, Indiana University, Bloomington, United States","institution_ids":["https://openalex.org/I4210164544","https://openalex.org/I4210119109"]},{"raw_affiliation_string":"Operations and Decision Technologies, Kelley School of Business, Indiana University, Bloomington, United States","institution_ids":["https://openalex.org/I4210164544","https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101919319","display_name":"Tapas K. Das","orcid":"https://orcid.org/0000-0002-8464-7383"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tapas Das","raw_affiliation_strings":["Department of Industrial and Management Systems Engineering, University of South Florida, Tampa, United States"],"affiliations":[{"raw_affiliation_string":"Department of Industrial and Management Systems Engineering, University of South Florida, Tampa, United States","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032194186","display_name":"Nathaniel D. Bastian","orcid":"https://orcid.org/0000-0001-9957-2778"},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nathaniel Bastian","raw_affiliation_strings":["Army Cyber Institute, United States Military Academy, West Point, United States","United States Military Academy,  West Point, United States"],"affiliations":[{"raw_affiliation_string":"Army Cyber Institute, United States Military Academy, West Point, United States","institution_ids":["https://openalex.org/I192545095"]},{"raw_affiliation_string":"United States Military Academy,  West Point, United States","institution_ids":["https://openalex.org/I192545095"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5091899379"],"corresponding_institution_ids":["https://openalex.org/I2613432"],"apc_list":null,"apc_paid":null,"fwci":15.5771,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.98866409,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"28","issue":"2","first_page":"1","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8456013202667236},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7938723564147949},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7422699332237244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6518707275390625},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6410175561904907},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6130067110061646},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5720537900924683},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5601248145103455},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.47585198283195496},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4719212055206299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4558722674846649},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.45444852113723755},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.44794583320617676},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.42829272150993347},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4256190061569214}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8456013202667236},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7938723564147949},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7422699332237244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6518707275390625},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6410175561904907},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6130067110061646},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5720537900924683},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5601248145103455},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47585198283195496},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4719212055206299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4558722674846649},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.45444852113723755},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.44794583320617676},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.42829272150993347},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4256190061569214},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3712307","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3712307","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3712307","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3712307","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G3242351311","display_name":null,"funder_award_id":"W911NF-22-2-0045","funder_id":"https://openalex.org/F4320337632","funder_display_name":"U.S. Military Academy"},{"id":"https://openalex.org/G8560588954","display_name":null,"funder_award_id":"USMA21056","funder_id":"https://openalex.org/F4320315784","funder_display_name":"U.S. Army Combat Capabilities Development Command Soldier Center"}],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"},{"id":"https://openalex.org/F4320315784","display_name":"U.S. Army Combat Capabilities Development Command Soldier Center","ror":"https://ror.org/02rdkx920"},{"id":"https://openalex.org/F4320337632","display_name":"U.S. Military Academy","ror":"https://ror.org/01jepya76"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1677182931","https://openalex.org/W1831194759","https://openalex.org/W1977366836","https://openalex.org/W2145339207","https://openalex.org/W2174359540","https://openalex.org/W2212660284","https://openalex.org/W2350778671","https://openalex.org/W2746553466","https://openalex.org/W2771537552","https://openalex.org/W2783741806","https://openalex.org/W2789828921","https://openalex.org/W2802196017","https://openalex.org/W2853623529","https://openalex.org/W2892077825","https://openalex.org/W2917814433","https://openalex.org/W2953448948","https://openalex.org/W2963516518","https://openalex.org/W2968455244","https://openalex.org/W2988465456","https://openalex.org/W2991408690","https://openalex.org/W3000562546","https://openalex.org/W3009674568","https://openalex.org/W3015481738","https://openalex.org/W3031287835","https://openalex.org/W3033213260","https://openalex.org/W3042565595","https://openalex.org/W3046233811","https://openalex.org/W3092574910","https://openalex.org/W3097911904","https://openalex.org/W3101155090","https://openalex.org/W3102844060","https://openalex.org/W3111088413","https://openalex.org/W3111563271","https://openalex.org/W3113708632","https://openalex.org/W3126413449","https://openalex.org/W3134622107","https://openalex.org/W3158598208","https://openalex.org/W3163963286","https://openalex.org/W3165205057","https://openalex.org/W3175255796","https://openalex.org/W3198511875","https://openalex.org/W3215475237","https://openalex.org/W4205828949","https://openalex.org/W4206569379","https://openalex.org/W4210598630","https://openalex.org/W4214717370","https://openalex.org/W4235381699","https://openalex.org/W4252553301","https://openalex.org/W4292838580","https://openalex.org/W4293193423","https://openalex.org/W4313591247","https://openalex.org/W4322627146","https://openalex.org/W4323340212","https://openalex.org/W4377693179"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W4307079546","https://openalex.org/W4283317927","https://openalex.org/W3102631191","https://openalex.org/W3096715398","https://openalex.org/W3021340315","https://openalex.org/W3027216454","https://openalex.org/W2924399089"],"abstract_inverted_index":{"Recent":[0,72],"advancements":[1],"in":[2,136],"artificial":[3],"intelligence":[4],"(AI)":[5],"and":[6,81,128,147,186],"machine":[7],"learning":[8,123],"(ML)":[9],"algorithms,":[10],"coupled":[11],"with":[12,50,106],"the":[13,21,30,40,51,67,77,96,109,132,137,200,209,213,222,240],"availability":[14],"of":[15,24,32,42,53,70,79,134,180,199,212,233,242],"faster":[16],"computing":[17],"infrastructure,":[18],"have":[19,47,74,91],"enhanced":[20],"security":[22,46],"posture":[23],"cybersecurity":[25],"operations":[26],"centers":[27],"(defenders)":[28],"through":[29],"development":[31],"ML-aided":[33],"network":[34,143],"intrusion":[35],"detection":[36,68],"systems":[37],"(NIDS).":[38],"Concurrently,":[39],"abilities":[41],"adversaries":[43],"to":[44,59,95,101,108,124,130,225,230],"evade":[45],"also":[48,193],"increased":[49],"support":[52],"AI/ML":[54],"models.":[55],"Therefore,":[56],"defenders":[57,238],"need":[58],"proactively":[60],"prepare":[61],"for":[62],"evasion":[63],"attacks":[64],"that":[65,76,195,207],"exploit":[66],"mechanisms":[69],"NIDS.":[71],"studies":[73],"found":[75],"perturbation":[78],"flow-based":[80,97],"packet-based":[82,110],"features":[83,98,111],"can":[84,236],"deceive":[85],"ML":[86,184],"models,":[87],"but":[88],"these":[89],"approaches":[90,135],"limitations.":[92],"Perturbations":[93],"made":[94],"are":[99,112],"difficult":[100],"reverse-engineer,":[102],"while":[103,160],"samples":[104,203],"generated":[105],"perturbations":[107,150,229],"not":[113],"playable.":[114],"Our":[115,191],"methodological":[116],"framework,":[117],"Deep":[118,153,172],"PackGen,":[119],"employs":[120],"deep":[121],"reinforcement":[122],"generate":[125],"adversarial":[126,177,202,247],"packets":[127,144,159,206,235],"aims":[129],"overcome":[131],"limitations":[133],"literature.":[138],"By":[139],"taking":[140],"raw":[141],"malicious":[142,234],"as":[145,157],"inputs":[146],"systematically":[148],"making":[149],"on":[151,221],"them,":[152],"PackGen":[154,173],"camouflages":[155],"them":[156],"benign":[158],"still":[161],"maintaining":[162],"their":[163,243],"functionality.":[164],"In":[165],"our":[166,219],"experiments,":[167],"using":[168],"publicly":[169],"available":[170],"data,":[171],"achieved":[174],"an":[175],"average":[176],"success":[178],"rate":[179],"66.4%":[181],"against":[182,245],"various":[183],"models":[185],"across":[187],"different":[188,231],"attack":[189],"types.":[190],"investigation":[192],"revealed":[194],"more":[196],"than":[197],"45%":[198],"successful":[201],"were":[204],"out-of-distribution":[205],"evaded":[208],"decision":[210],"boundaries":[211],"classifiers.":[214],"The":[215],"knowledge":[216],"gained":[217],"from":[218],"study":[220],"adversary\u2019s":[223],"ability":[224],"make":[226],"specific":[227],"evasive":[228],"types":[232],"help":[237],"enhance":[239],"robustness":[241],"NIDS":[244],"evolving":[246],"attacks.":[248]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
