{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:01:22Z","timestamp":1753887682057,"version":"3.41.2"},"reference-count":52,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T00:00:00Z","timestamp":1623283200000},"content-version":"vor","delay-in-days":160,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836103","U20A20161"],"award-info":[{"award-number":["U1836103","U20A20161"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>In the intelligent era of human\u2010computer symbiosis, the use of machine learning method for covert communication confrontation has become a hot topic of network security. The existing covert communication technology focuses on the statistical abnormality of traffic behavior and does not consider the sensory abnormality of security censors, so it faces the core problem of lack of cognitive ability. In order to further improve the concealment of communication, a game method of \u201ccognitive deception\u201d is proposed, which is aimed at eliminating the anomaly of traffic in both behavioral and cognitive dimensions. Accordingly, a Wasserstein Generative Adversarial Network of Covert Channel (WCCGAN) model is established. The model uses the constraint sampling of cognitive priors to construct the constraint mechanism of \u201cfunctional equivalence\u201d and \u201ccognitive equivalence\u201d and is trained by a dynamic strategy updating learning algorithm. Among them, the generative module adopts joint expression learning which integrates network protocol knowledge to improve the expressiveness and discriminability of traffic cognitive features. The equivalent module guides the discriminant module to learn the pragmatic relevance features through the activity loss function of traffic and the application loss function of protocol for end\u2010to\u2010end training. The experimental results show that WCCGAN can directly synthesize traffic with comprehensive concealment ability, and its behavior concealment and cognitive deception are as high as 86.2% and 96.7%, respectively. Moreover, the model has good convergence and generalization ability and does not depend on specific assumptions and specific covert algorithms, which realizes a new paradigm of cognitive game in covert communication.<\/jats:p>","DOI":"10.1155\/2021\/9982351","type":"journal-article","created":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T22:08:31Z","timestamp":1623362911000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6405-8445","authenticated-orcid":false,"given":"Zhangguo","family":"Tang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1699-2270","authenticated-orcid":false,"given":"Junfeng","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0139-9175","authenticated-orcid":false,"given":"Huanzhou","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4067-3467","authenticated-orcid":false,"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4772-6867","authenticated-orcid":false,"given":"Junhao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,6,10]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"crossref","unstructured":"NowakowskiP. Z\u00f3rawskiP. CabajK. andMazurczykW. Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study Proceedings of the 15th International Conference on Availability Reliability and Security Virtual Event Ireland 2020 Ireland 1\u201310.","DOI":"10.1145\/3407023.3409217"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09723-7"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1531"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11020731"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6281-1"},{"key":"e_1_2_10_6_2","article-title":"Design of a steganographic system for hiding information in TCP\/IP packets[J]","volume":"5","author":"Castro E. R. L.","year":"2018","journal-title":"International Advanced Research Journal in Science, Engineering and Technology. 2018. ISO 3297:2007 Certified"},{"key":"e_1_2_10_7_2","article-title":"New high secure network steganography method based on packet length[J]","volume":"12","author":"Sabeti V.","year":"2020","journal-title":"ISeCure"},{"volume-title":"Channel Coding Information Hiding Technology Based on Spacecraft Application[M]\/\/Signal and Information Processing","year":"2021","author":"Zhang R.","key":"e_1_2_10_8_2"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66808-6_8"},{"key":"e_1_2_10_10_2","doi-asserted-by":"crossref","unstructured":"RigakiM.andGarciaS. Bringing a GAN to a knife-fight: adapting malware communication to avoid detection 2018 IEEE Security and Privacy Workshops (SPW) 2018 San Francisco CA USA 70\u201375.","DOI":"10.1109\/SPW.2018.00019"},{"key":"e_1_2_10_11_2","unstructured":"LinZ. ShiY. andXueZ. Idsgan: generative adversarial networks for attack generation against intrusion detection[J] 2018 arXiv preprint arXiv: 1809.02077."},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-019-00925-6"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.012"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8892896"},{"volume-title":"Tight Tradeoffs in Searchable Symmetric Encryption[C]\/\/Annual International Cryptology Conference","year":"2018","author":"Asharov G.","key":"e_1_2_10_15_2"},{"key":"e_1_2_10_16_2","doi-asserted-by":"crossref","unstructured":"NasseralfogharaM.andHamidiH. Web covert timing channels detection based on entropy 2019 5th International Conference on Web Research (ICWR) 2019 Tehran Iran 12\u201315.","DOI":"10.1109\/ICWR.2019.8765291"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"AmeriA.andJohnsonD. Covert channel over network time protocol Proceedings of the 2017 International Conference on Cryptography Security and Privacy - ICCSP \u203217 2017 Wuhan China 62\u201365.","DOI":"10.1145\/3058060.3058082"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3242-9_46"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.011554"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1325\/1\/012050"},{"key":"e_1_2_10_21_2","doi-asserted-by":"crossref","unstructured":"ShangF. LiX. ZhaiD. andQianY. On the distributed jamming system of covert timing channels in 5G networks Jun 2020 in 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA) 2020 Dalian China 1107\u20131111.","DOI":"10.1109\/ICAICA50127.2020.9182534"},{"key":"e_1_2_10_22_2","unstructured":"HoJ. W. WonK. R. andKimJ. S. POSTER Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security Association for Computing Machinery 2017 New York NY United States 2499\u20132501."},{"key":"e_1_2_10_23_2","doi-asserted-by":"crossref","unstructured":"SunY. ZhangL. andZhaoC. A study of network covert channel detection based on deep learning 2018 2nd IEEE Advanced Information Management Communicates Electronic and Automation Control Conference (IMCEC) 2018 Xi\u2032an China 637\u2013641.","DOI":"10.1109\/IMCEC.2018.8469669"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35130-3_9"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.011219"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2684195"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.09903"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2020.011750"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.05575"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.09754"},{"key":"e_1_2_10_31_2","unstructured":"GoodfellowI. J. Pouget-AbadieJ. MirzaM. XuB. Warde-FarleyD. OzairS. CourvilleA. andBengioY. Generative adversarial networks 2014 arXiv preprint arXiv: 1406.2661."},{"key":"e_1_2_10_32_2","unstructured":"OhS. E. SunkamS. andHopperN. Traffic analysis with deep learning 2017 arXiv preprint arXiv: 1711.03656."},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0024"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"e_1_2_10_35_2","unstructured":"HuW.andTanY. Generating adversarial malware examples for black-box attacks based on GAN 2017 arXiv preprint arXiv:1702.05983."},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912896"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007577"},{"key":"e_1_2_10_38_2","unstructured":"RimmerV. PreuveneersD. JuarezM. Van GoethemT. andJoosenW. Automated website fingerprinting through deep learning 2017 arXiv preprint arXiv:1708.06376."},{"key":"e_1_2_10_39_2","doi-asserted-by":"crossref","unstructured":"OverdorfR. JuarezM. AcarG. GreenstadtR. andDiazC. How unique is your .onion? Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017 Dallas Texas USA 2021\u20132036.","DOI":"10.1145\/3133956.3134005"},{"key":"e_1_2_10_40_2","first-page":"1540","article-title":"Generation of malicious domain training data based on generative adversarial net-work[J]","volume":"36","author":"Chen Y.","year":"2019","journal-title":"Application Research of Computers"},{"key":"e_1_2_10_41_2","first-page":"344","article-title":"Generation and verification of malicious network flow based on generative adversarial networks[J]","volume":"45","author":"Pan Y. M.","year":"2019","journal-title":"Journal of East China University of Science and Technology"},{"key":"e_1_2_10_42_2","doi-asserted-by":"crossref","unstructured":"ChengA. PAC-GAN: packet generation of network traffic using generative adversarial networks 2019 IEEE 10th Annual Information Technology Electronics and Mobile Communication Conference (IEMCON) 2019 Vancouver BC Canada 0728\u20130734.","DOI":"10.1109\/IEMCON.2019.8936224"},{"key":"e_1_2_10_43_2","doi-asserted-by":"crossref","unstructured":"ShahidM. R. BlancG. JmilaH. ZhangZ. andDebarH. Generative deep learning for Internet of Things network traffic generation 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC) 2020 Perth WA Australia 70\u201379.","DOI":"10.1109\/PRDC50213.2020.00018"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.02.034"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2016.03.008"},{"key":"e_1_2_10_46_2","first-page":"377","volume-title":"International Workshop on Digital Watermarking","author":"Yang Z.","year":"2019"},{"key":"e_1_2_10_47_2","unstructured":"ShenY. Research on network protocol covert channel detection and new construction scheme [Ph.D. Thesis] 2017 China University of Science and Technology Hefei (in Chinese with English abstract)."},{"key":"e_1_2_10_48_2","unstructured":"MirzaM.andOsinderoS. Conditional generative adversarial nets[J] 2014 arXiv preprint arXiv:1411.1784."},{"key":"e_1_2_10_49_2","unstructured":"GulrajaniI. AhmedF. ArjovskyM. DumoulinV. andCourvilleA. Improved training of Wasserstein GANs[J] 2017 arXiv preprint arXiv:1704.00028."},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1561\/2200000073"},{"key":"e_1_2_10_51_2","doi-asserted-by":"crossref","unstructured":"OuyangX. ChenY. andAgamG. Accelerated WGAN update strategy with loss change rate balancing[C] Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision 2021 Waikoloa United States 2546\u20132555.","DOI":"10.1109\/WACV48630.2021.00259"},{"key":"e_1_2_10_52_2","doi-asserted-by":"crossref","unstructured":"Montazeri ShatooriM. DavidsonL. KaurG. andLashkariA. H. Detection of DoH tunnels using time-series classification of encrypted traffic [C] 2020 IEEE Intl Conf on dependable autonomic and secure computing Intl Conf on pervasive intelligence and computing Intl Conf on cloud and big data computing Intl Conf on cyber science and technology congress (DASC\/PiCom\/CBDCom\/CyberSciTech) 2020 63\u201370.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/9982351.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/9982351.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/9982351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:58:12Z","timestamp":1723039092000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/9982351"}},"subtitle":[],"editor":[{"given":"Di","family":"Zhang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/9982351"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9982351","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-03-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9982351"}}