Distributed Generative Adversarial Networks for Anomaly Detection

Cognitive radio networks can be used to detect anomalous and adversarial communications to achieve situational awareness on the radio frequency spectrum. This paper proposes a distributed anomaly detection scheme based on adversarially-trained data models. While many anomaly detection methods typically depend on a central decision-making server, our distributed approach makes better use of decentralized resources, and decreases reliance on a single point of failure. Using a novel combination of generative adversarial network (GAN) elements, participating cognitive radio devices learn a representation of local network activity data through a non-cooperative (strategic) game. Deviations from this expected network activity are flagged as anomalies and treated as possible network security threats, improving situational awareness. Tested on a range of time series datasets, the performance of the proposed distributed scheme matches that of state-of-the-art, centralized anomaly detection methods.

[1]  Yuan Shi,et al.  Detecting Primary User Emulation Attack in Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[2]  Georg Langs,et al.  f‐AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks , 2019, Medical Image Anal..

[3]  拓海 杉山,et al.  “Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks”の学習報告 , 2017 .

[4]  Dirk Thierens,et al.  Non-redundant genetic coding of neural networks , 1996, Proceedings of IEEE International Conference on Evolutionary Computation.

[5]  Georg Langs,et al.  Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.

[6]  Lei Shi,et al.  MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.

[7]  He Ma,et al.  Generative Adversarial Parallelization , 2016, ArXiv.

[8]  Shilian Zheng,et al.  Specific primary user sensing for wireless security in IEEE 802.22 network , 2011, 2011 11th International Symposium on Communications & Information Technologies (ISCIT).

[9]  Bruno Sericola,et al.  MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets , 2018, 2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[10]  Joseph Mitola An Integrated Agent Architecture for Software Defined Radio , 2000 .

[11]  Sundar Srinivasan,et al.  Semi-supervised machine learning for primary user emulation attack detection and prevention through core-based analytics for cognitive radio networks , 2019, Int. J. Distributed Sens. Networks.

[12]  Mario Lucic,et al.  Are GANs Created Equal? A Large-Scale Study , 2017, NeurIPS.

[13]  Trevor Darrell,et al.  Adversarial Feature Learning , 2016, ICLR.

[14]  Sepp Hochreiter,et al.  GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium , 2017, NIPS.

[15]  Prateek Jain,et al.  ProtoNN: Compressed and Accurate kNN for Resource-scarce Devices , 2017, ICML.

[16]  Trung Le,et al.  MGAN: Training Generative Adversarial Nets with Multiple Generators , 2018, ICLR.

[17]  Yalin E. Sagduyu,et al.  Spectrum Data Poisoning with Adversarial Deep Learning , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).

[18]  Yoshua Bengio,et al.  Generative Adversarial Networks , 2014, ArXiv.

[19]  Meng Wang,et al.  Generative Adversarial Active Learning for Unsupervised Outlier Detection , 2018, IEEE Transactions on Knowledge and Data Engineering.

[20]  Chuan Sheng Foo,et al.  Efficient GAN-Based Anomaly Detection , 2018, ArXiv.

[21]  R. Nagaraj,et al.  Anomaly Detection via Online Oversampling Principal Component Analysis , 2014 .

[22]  Léon Bottou,et al.  Wasserstein Generative Adversarial Networks , 2017, ICML.

[23]  Lawrence Carin,et al.  ALICE: Towards Understanding Adversarial Learning for Joint Distribution Matching , 2017, NIPS.

[24]  Walid Saad,et al.  Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[25]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[26]  Anil A. Bharath,et al.  Inverting the Generator of a Generative Adversarial Network , 2016, IEEE Transactions on Neural Networks and Learning Systems.

[27]  Yue Zhao,et al.  PyOD: A Python Toolbox for Scalable Outlier Detection , 2019, J. Mach. Learn. Res..