{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:27:24Z","timestamp":1778153244665,"version":"3.51.4"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2025,1,31]]},"abstract":"<jats:p>\n            The advent of generative networks and their adoption in numerous domains and communities have led to a wave of innovation and breakthroughs in AI and machine learning. Generative Adversarial Networks (GANs) have expanded the scope of what is possible with machine learning, allowing for new applications in areas such as computer vision, natural language processing, and creative AI. GANs, in particular, have been used for a wide range of tasks, including image and video generation, data augmentation, style transfer, and anomaly detection. They have also been used for medical imaging and drug discovery, where they can generate synthetic data to augment small datasets, reduce the need for expensive experiments, and lower the number of real patients that must be included in medical trials. Given these developments, we propose using the power of GANs to create and augment flow-based network traffic datasets. We evaluate a series of GAN architectures, including Wasserstein, conditional, energy-based, gradient penalty, and LSTM-GANs. We evaluate their performance on a set of flow-based network traffic data collected from 16 subjects who used their computers for home, work, and study purposes. The performance of these GAN architectures is described according to metrics that involve networking principles, data distribution among a collection of flows, and temporal data distribution. Given the tendency of network intrusion detection datasets to have a very imbalanced data distribution, i.e., a large number of samples in the \u201cnormal traffic\u201d category and a comparatively low number of samples assigned to the \u201cintrusion\u201d categories, we test our GANs by augmenting the intrusion data and checking whether this helps intrusion detection neural networks in their task. We publish the resulting UPBFlow dataset and code on GitHub.\n            <jats:xref ref-type=\"fn\">\n              <jats:sup>1<\/jats:sup>\n            <\/jats:xref>\n          <\/jats:p>","DOI":"10.1145\/3689636","type":"journal-article","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T16:02:31Z","timestamp":1726675351000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Exploring Generative Adversarial Networks for Augmenting Network Intrusion Detection Tasks"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2312-6672","authenticated-orcid":false,"given":"Mihai Gabriel","family":"Constantin","sequence":"first","affiliation":[{"name":"University Politehnica of Bucharest, Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4561-4328","authenticated-orcid":false,"given":"Dan-Cristian","family":"Stanciu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9174-3923","authenticated-orcid":false,"given":"Liviu-Daniel","family":"\u015etefan","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8189-8566","authenticated-orcid":false,"given":"Mihai","family":"Dogariu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8904-1801","authenticated-orcid":false,"given":"Dan","family":"Mih\u0103ilescu","sequence":"additional","affiliation":[{"name":"Keysight Technologies, Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2903-7977","authenticated-orcid":false,"given":"George","family":"Ciobanu","sequence":"additional","affiliation":[{"name":"Keysight Technologies, Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5152-2713","authenticated-orcid":false,"given":"Matt","family":"Bergeron","sequence":"additional","affiliation":[{"name":"Keysight Technologies, Santa Rosa, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8176-9758","authenticated-orcid":false,"given":"Winston","family":"Liu","sequence":"additional","affiliation":[{"name":"Keysight Technologies, Santa Rosa, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0068-4414","authenticated-orcid":false,"given":"Konstantin","family":"Belov","sequence":"additional","affiliation":[{"name":"Keysight Technologies, Santa Rosa, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1634-5065","authenticated-orcid":false,"given":"Octavian","family":"Radu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4112-5769","authenticated-orcid":false,"given":"Bogdan","family":"Ionescu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Bucharest, Romania"}]}],"member":"320","published-online":{"date-parts":[[2024,12,23]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599782"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108719"},{"key":"e_1_3_2_5_2","first-page":"214","volume-title":"International Conference on Machine Learning","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In International Conference on Machine Learning. PMLR, 214\u2013223."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"0728","DOI":"10.1109\/IEMCON.2019.8936224","volume-title":"2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","author":"Cheng Adriel","year":"2019","unstructured":"Adriel Cheng. 2019. PAC-GAN: Packet generation of network traffic using generative adversarial networks. In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 0728\u20130734."},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"issue":"6","key":"e_1_3_2_8_2","first-page":"446","article-title":"A study on NSL-KDD dataset for intrusion detection system based on classification algorithms","volume":"4","author":"Dhanabal L.","year":"2015","unstructured":"L. Dhanabal and S. P. Shantharajah. 2015. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4, 6 (2015), 446\u2013452.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"e_1_3_2_9_2","first-page":"34","volume-title":"AAAI Conference on Artificial Intelligence","volume":"32","author":"Dong Hao-Wen","year":"2018","unstructured":"Hao-Wen Dong, Wen-Yi Hsiao, Li-Chia Yang, and Yi-Hsuan Yang. 2018. Musegan: Multi-track sequential generative adversarial networks for symbolic music generation and accompaniment. In AAAI Conference on Artificial Intelligence, Vol. 32, 34\u201341."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.12.030"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_12_2","volume-title":"The Illustrated Network: How TCP\/IP Works in a Modern Network","author":"Goralski Walter","year":"2017","unstructured":"Walter Goralski. 2017. The Illustrated Network: How TCP\/IP Works in a Modern Network. Morgan Kaufmann."},{"key":"e_1_3_2_13_2","first-page":"1","article-title":"Improved training of Wasserstein GANs","volume":"30","author":"Gulrajani Ishaan","year":"2017","unstructured":"Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C. Courville. 2017. Improved training of Wasserstein GANs. Advances in Neural Information Processing Systems 30 (2017), 1\u201311.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_16_2","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980."},{"key":"e_1_3_2_17_2","series-title":"Proceedings 12","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-030-34914-1_29","volume-title":"Internet and Distributed Computing Systems: 12th International Conference, (IDCS \u201919)","author":"Lee WooHo","year":"2019","unstructured":"WooHo Lee, BongNam Noh, YeonSu Kim, and KiMoon Jeong. 2019. Generation of network traffic using WGAN-GP and a DFT filter for resolving data imbalance. In Internet and Distributed Computing Systems: 12th International Conference, (IDCS \u201919), Proceedings 12. Springer, 306\u2013317."},{"key":"e_1_3_2_18_2","series-title":"CSA-CUTE 2018","first-page":"1","volume-title":"Advances in Computer Science and Ubiquitous Computing","author":"Lee Woo Ho","year":"2020","unstructured":"Woo Ho Lee, Chae Sang Lim, and Bong Nam Noh. 2020. Generation of similar traffic using GAN for resolving data imbalance. In Advances in Computer Science and Ubiquitous Computing, CSA-CUTE 2018. James J. Park, Doo-Soon Park, Young-Sik Jeong, and Yi Pan (Eds.), Springer, 1\u20137."},{"key":"e_1_3_2_19_2","first-page":"1","article-title":"Smart detection: An online approach for DoS\/DDoS attack detection using machine learning","volume":"2019","author":"Filho Francisco Sales de Lima","year":"2019","unstructured":"Francisco Sales de Lima Filho, Frederico A. F. Silveira, Agostinho de Medeiros Brito Junior, Genoveva Vargas-Solar, and Luiz F. Silveira. 2019. Smart detection: An online approach for DoS\/DDoS attack detection using machine learning. Security and Communication Networks 2019 (2019), 1\u201315.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_20_2","first-page":"14286","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Liu Steven","year":"2020","unstructured":"Steven Liu, Tongzhou Wang, David Bau, Jun-Yan Zhu, and Antonio Torralba. 2020. Diverse image generation via self-conditioned GANs. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 14286\u201314295."},{"key":"e_1_3_2_21_2","first-page":"1","article-title":"Distributed representations of words and phrases and their compositionality","volume":"26","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. Advances in Neural Information Processing Systems 26 (2013), 1\u20139.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_22_2","unstructured":"Mehdi Mirza and Simon Osindero. 2014. Conditional generative adversarial nets. arXiv:1411.1784."},{"key":"e_1_3_2_23_2","first-page":"1","volume-title":"International Conference on Learning Representations","author":"Nie Weili","year":"2019","unstructured":"Weili Nie, Nina Narodytska, and Ankit Patel. 2019. RelGAN: Relational generative adversarial networks for text generation. In International Conference on Learning Representations, 1\u201320."},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1109\/ICPR.2018.8545419","volume-title":"2018 24th International Conference on Pattern Recognition (ICPR)","author":"Ouyang Xu","year":"2018","unstructured":"Xu Ouyang, Xi Zhang, Di Ma, and Gady Agam. 2018. Generating image sequence from description with LSTM conditional GAN. In 2018 24th International Conference on Pattern Recognition (ICPR). IEEE, 2456\u20132461."},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/ICDMW.2017.93","volume-title":"2017 IEEE International Conference on Data Mining Workshops (ICDMW)","author":"Ring Markus","year":"2017","unstructured":"Markus Ring, Alexander Dallmann, Dieter Landes, and Andreas Hotho. 2017. Ip2vec: Learning similarities between IP addresses. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 657\u2013666."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.012"},{"key":"e_1_3_2_27_2","first-page":"431","volume-title":"International Proceedings on Advances in Soft Computing, Intelligent Systems and Applications (ASISA \u201916)","author":"Rout Neelam","year":"2018","unstructured":"Neelam Rout, Debahuti Mishra, and Manas Kumar Mallick. 2018. Handling imbalanced data: A survey. In International Proceedings on Advances in Soft Computing, Intelligent Systems and Applications (ASISA \u201916). Springer, 431\u2013443."},{"key":"e_1_3_2_28_2","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018), 108\u2013116.","journal-title":"ICISSp"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.10.004"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.330"},{"issue":"3","key":"e_1_3_2_31_2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.4018\/IJDCF.2019070104","article-title":"A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs): Deep learning for N-IDSs","volume":"11","author":"Vinayakumar R.","year":"2019","unstructured":"R. Vinayakumar, K. P. Soman, and Prabaharan Poornachandran. 2019. A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs): Deep learning for N-IDSs. International Journal of Digital Crime and Forensics (IJDCF) 11, 3 (2019), 65\u201389.","journal-title":"International Journal of Digital Crime and Forensics (IJDCF)"},{"key":"e_1_3_2_32_2","first-page":"1","volume-title":"ICC 2020-2020 IEEE International Conference on Communications (ICC)","author":"Wang Pan","year":"2020","unstructured":"Pan Wang, Shuhang Li, Feng Ye, Zixuan Wang, and Moxuan Zhang. 2020. PacketCGAN: Exploratory study of class imbalance for encrypted traffic classification using CGAN. In ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1\u20137."},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2021.104540"},{"key":"e_1_3_2_34_2","first-page":"21","volume-title":"NIPS Workshop on Adversarial Training","volume":"21","author":"Zhang Yizhe","year":"2016","unstructured":"Yizhe Zhang, Zhe Gan, and Lawrence Carin. 2016. Generating text via adversarial training. In NIPS Workshop on Adversarial Training, Vol. 21, 21\u201332."},{"key":"e_1_3_2_35_2","unstructured":"Junbo Zhao Michael Mathieu and Yann LeCun. 2016. Energy-based generative adversarial network. arXiv:1609.03126."},{"key":"e_1_3_2_36_2","doi-asserted-by":"crossref","first-page":"0540","DOI":"10.1109\/IEMCON51383.2020.9284901","volume-title":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","author":"Zingo Pasquale","year":"2020","unstructured":"Pasquale Zingo and Andrew Novocin. 2020. Can GAN-generated network traffic be used to train traffic anomaly classifiers? In 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 0540\u20130545."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:47Z","timestamp":1750295387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,23]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,31]]}},"alternative-id":["10.1145\/3689636"],"URL":"https:\/\/doi.org\/10.1145\/3689636","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,23]]},"assertion":[{"value":"2023-05-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}