With artificial intelligence (AI) becoming relevant in various parts of everyday life, other technologies are already widely influenced by the new way of handling large amounts of data. Although widespread already, AI has had only punctual influences on the cybersecurity field specifically. Many techniques and technologies used by cybersecurity experts function through manual labor and barely draw on automation, e.g., logs are often reviewed manually by system admins for potentially malicious keywords. This work evaluates the use of a special type of AI called generative adversarial networks (GANs) for log generation. More precisely, three different generative adversarial networks, SeqGAN, MaliGAN, and CoT, are reviewed in this research regarding their performance, focusing on generating new logs as a means of deceiving system admins for red teams. Although static generators for fake logs have been around for a while, their produces are usually easy to reveal as such. Using AI as an approach to this problem has not been widely researched. Identified challenges consist of formatting, dates and times, and overall consistency. Summing up the results, GANs seem not to be a good fit for generating fake logs. Their capability to detect fake logs, however, might be of use in practical scenarios.
翻译:随着人工智能(AI)在日常生活的各个部分变得具有相关性,其他技术已经广泛受到处理大量数据的新方式的广泛影响。尽管已经广泛存在,但AI只对网络安全领域产生了准时的影响。网络安全专家使用的许多技术和工艺通过体力工作运作,几乎不依靠自动化,例如,日志往往由系统管理员手工审查,用于潜在恶意关键词。这项工作评估了一种特殊类型的AI的使用情况,称为基因对抗网络(GANs),用于日志生成。更准确地说,三个不同的基因对抗网络,SeqGAN、马里GAN和COT,在关于其绩效的研究中受到审查,重点是制作新的日志,作为红色团队解构系统管理器的手段。虽然伪造日志的静态生成器已经存在一段时间,但它们的制作通常很容易被披露出来。使用AI作为解决这一问题的一种方法,发现的挑战包括格式、日期和时间,以及总体一致性。总结结果时,GANs似乎不适合生成假日志。但是,它们检测假日志的能力是用来模拟的。