A survey on generative adversarial networks for malware analysis
Author affiliations
DOI:
https://doi.org/10.15625/1813-9663/22522Keywords:
Generative adversarial network, malware analysis, cybersecurity.Abstract
Generative Adversarial Networks (GANs) have recently become an interesting subject for researchers due to their diverse applications across various fields. Initially focused on imagerelated tasks, they then have been used to generate new synthetic data for applications across many areas of machine learning research. In malware analysis, GANs have rapidly expanded and are used to generate adversarial data for enhancing the effectiveness of malware detection systems. This paper reviews the application of GANs in malware analysis to generate adversarial examples, to modify semantic information within data, to augment datasets for rare classes, and to support representation learning. The paper provides an extensive overview that serves both as a primer for cybersecurity specialists and a resource for machine learning researchers. The paper outlines the fundamentals of GANs, their operational mechanism, the current types of GANs, the challenges faced, and future directions for exploration in malware analysis.
Downloads
Published
How to Cite
Issue
Section
License
1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.

