Towards oblivious network analysis using generative adversarial networks

5Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Modern systems across diverse application domains (e.g., IoT, automotive) have many black-box devices whose internal structures and/or protocol formats are unknown. We currently lack the tools to systematically understand the behavior and learn the security weaknesses of these black-box devices. Such tools could enable many use cases, such as: 1) identifying input packets that lead to network attacks; and 2) inferring the format of unknown protocols. Our goal is to enable oblivious network analysis which can perform the aforementioned tasks for black-box devices. In this work, we explore the use of a recent machine learning tool called generative adversarial networks (GANs) [16] to enable this vision. Unlike other competing approaches, GANs can work in a truly black-box setting and can infer complex dependencies between protocol fields with little to no supervision. We leverage GANs to show the preliminary use cases of our approaches using two case studies: 1) generating synthetic protocol messages given only samples of messages; and 2) generating attack inputs for a black-box system. While there are still many open challenges, our results suggest the early promise of GANs to enable "oblivious" analysis of networked elements.

Cite

CITATION STYLE

APA

Lin, Z., Moon, S. J., Zarate, C. M., Mulagalapalli, R., Kulandaivel, S., Fanti, G., & Sekar, V. (2019). Towards oblivious network analysis using generative adversarial networks. In HotNets 2019 - Proceedings of the 18th ACM Workshop on Hot Topics in Networks (pp. 43–51). Association for Computing Machinery, Inc. https://doi.org/10.1145/3365609.3365854

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free