{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:42:22Z","timestamp":1761000142421,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535361"},{"type":"electronic","value":"9789819535378"}],"license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3537-8_28","type":"book-chapter","created":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T10:43:58Z","timestamp":1760870638000},"page":"511-530","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CascadeGen: A Hybrid GAN-Diffusion Framework for\u00a0Controllable and\u00a0Protocol-Compliant Synthetic Network Traffic Generation"],"prefix":"10.1007","author":[{"given":"Qingyuan","family":"Yu","sequence":"first","affiliation":[]},{"given":"Chuping","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Xiaoying","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Liu, Z., Wang, M., Cui, Y.: Locality matters! Traffic demand modeling in datacenter networks. In: Proceedings of the 6th Asia-Pacific Workshop on Networking, pp. 8\u201313 (2022)","DOI":"10.1145\/3542637.3542639"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Huang, S., et al.: Datacenter network deserves better traffic models. In: Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, pp. 124\u2013130 (2023)","DOI":"10.1145\/3626111.3628209"},{"issue":"5","key":"28_CR3","doi-asserted-by":"publisher","first-page":"68","DOI":"10.3390\/jsan12050068","volume":"12","author":"M Mouyart","year":"2023","unstructured":"Mouyart, M., Medeiros Machado, G., Jun, J.Y.: A multi-agent intrusion detection system optimized by a deep reinforcement learning approach with a dataset enlarged using a generative model to reduce the bias effect. J. Sens. Actuator Netw. 12(5), 68 (2023)","journal-title":"J. Sens. Actuator Netw."},{"key":"28_CR4","unstructured":"Goodfellow, I.J., et al.: Generative adversarial nets. Adv. Neural. Inf. Process. Syst. 27 (2014)"},{"key":"28_CR5","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840\u20136851 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"28_CR6","unstructured":"Song, Y., Sohl-Dickstein, J., Kingma, D.P., Kumar, A., Ermon, S., Poole, B.: Score-based generative modeling through stochastic differential equations. arXiv preprint arXiv:2011.13456 (2020)"},{"key":"28_CR7","unstructured":"Bovenzi, G., et al.: Mapping the landscape of generative AI in network monitoring and management. arXiv preprint arXiv:2502.08576 (2025)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Holland, J., Schmitt, P., Feamster, N., Mittal, P.: New directions in automated traffic analysis. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3366\u20133383 (2021)","DOI":"10.1145\/3460120.3484758"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Kamoltham, N., Nakorn, K.N., Rojviboonchai, K.: From NS-2 to NS-3-implementation and evaluation. In: 2012 Computing, Communications and Applications Conference, pp. 35\u201340. IEEE (2012)","DOI":"10.1109\/ComComAp.2012.6153999"},{"issue":"10","key":"28_CR10","doi-asserted-by":"publisher","first-page":"1920","DOI":"10.3390\/electronics13101920","volume":"13","author":"M Kim","year":"2024","unstructured":"Kim, M., Jeon, S., Cho, J., Gong, S.: Data-driven ICS network simulation for synthetic data generation. Electronics 13(10), 1920 (2024)","journal-title":"Electronics"},{"issue":"24","key":"28_CR11","doi-asserted-by":"publisher","first-page":"9855","DOI":"10.3390\/s23249855","volume":"23","author":"JH Lee","year":"2023","unstructured":"Lee, J.H., Ji, I.H., Jeon, S.H., Seo, J.T.: Generating ICS anomaly data reflecting cyber-attack based on systematic sampling and linear regression. Sensors 23(24), 9855 (2023)","journal-title":"Sensors"},{"issue":"2","key":"28_CR12","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/electronics13020322","volume":"13","author":"G Agrawal","year":"2024","unstructured":"Agrawal, G., Kaur, A., Myneni, S.: A review of generative models in generating synthetic attack data for cybersecurity. Electronics 13(2), 322 (2024)","journal-title":"Electronics"},{"key":"28_CR13","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Yin, Y., Lin, Z., Jin, M., Fanti, G., Sekar, V.: Practical GAN-based synthetic IP header trace generation using NetShare. In: Proceedings of the ACM SIGCOMM 2022 Conference, pp. 458\u2013472 (2022)","DOI":"10.1145\/3544216.3544251"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Lin, Z., Jain, A., Wang, C., Fanti, G., Sekar, V.: Using GANs for sharing networked time series data: challenges, initial promise, and open questions. In: Proceedings of the ACM Internet Measurement Conference, pp. 464\u2013483 (2020)","DOI":"10.1145\/3419394.3423643"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Mozo, A., Gonz\u00e1lez-Prieto, A., Pastor, A., Gomez-Canaval, S., Talavera, E.: Synthetic flow-based cryptomining attack generation through generative adversarial networks. Sci. Rep. (2022)","DOI":"10.1038\/s41598-022-06057-2"},{"key":"28_CR17","doi-asserted-by":"publisher","unstructured":"Lin, Z., Shi, Y., Xue, Z.: IDSGAN: generative adversarial networks for attack generation against intrusion detection. In: Gama, J., Li, T., Yu, Y., Chen, E., Zheng, Y., Teng, F. (eds.) PAKDD 2022. LNCS, vol. 13282, pp. 79\u201391. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05981-0_7","DOI":"10.1007\/978-3-031-05981-0_7"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Wang, M., Yang, N., Forcade-Perkins, N.J., Weng, N.: ProGen: projection-based adversarial attack generation against network intrusion detection. IEEE Trans. Inf. Forensics Secur. (2024)","DOI":"10.1109\/TIFS.2024.3402155"},{"key":"28_CR19","first-page":"103472","volume":"74","author":"PT Duy","year":"2023","unstructured":"Duy, P.T., Khoa, N.H., Do Hoang, H., Pham, V.H., et al.: Investigating on the robustness of flow-based intrusion detection system against adversarial samples using generative adversarial networks. J. Inf. Secur. Appl. 74, 103472 (2023)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"28_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3639037","volume":"8","author":"X Jiang","year":"2024","unstructured":"Jiang, X., Liu, S., Gember-Jacobson, A., Bhagoji, A.N., Schmitt, P., Bronzino, F., Feamster, N.: NetDiffusion: Network data augmentation through protocol-constrained traffic generation. Proc. ACM Meas. Anal. Comput. Syst. 8(1), 1\u201332 (2024)","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"28_CR21","doi-asserted-by":"publisher","first-page":"110616","DOI":"10.1016\/j.comnet.2024.110616","volume":"251","author":"N Sivaroopan","year":"2024","unstructured":"Sivaroopan, N., Bandara, D., Madarasingha, C., Jourjon, G., Jayasumana, A.P., Thilakarathna, K.: NetDiffus: network traffic generation by diffusion models through time-series imaging. Comput. Netw. 251, 110616 (2024)","journal-title":"Comput. Netw."},{"key":"28_CR22","unstructured":"Wang, Q., Qian, C., Li, X., Yao, Z., Zhou, G., Shao, H.: Lens: a foundation model for network traffic. arXiv preprint arXiv:2402.03646 (2024)"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp.\u00a01\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"28_CR24","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.cose.2017.11.004","volume":"73","author":"G Maci\u00e1-Fern\u00e1ndez","year":"2018","unstructured":"Maci\u00e1-Fern\u00e1ndez, G., Camacho, J., Mag\u00e1n-Carri\u00f3n, R., Garc\u00eda-Teodoro, P., Ther\u00f3n, R.: UGR \u201816: a new dataset for the evaluation of cyclostationarity-based network IDSs. Comput. Secur. 73, 411\u2013424 (2018)","journal-title":"Comput. Secur."},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Cormode, G.: Count-min sketch (2009)","DOI":"10.1007\/978-0-387-39940-9_87"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3537-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:02:52Z","timestamp":1760997772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3537-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"ISBN":["9789819535361","9789819535378"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3537-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,20]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}