Adversarial Defense in Cybersecurity: A Systematic Review of GANs for Threat Detection and Mitigation
Ndayipfukamiye, Tharcisse, Ding, Jianguo, Sarwatt, Doreen Sebastian, Philipo, Adamu Gaston, Ning, Huansheng
–arXiv.org Artificial Intelligence
Digital transformation of modern society has spread the attack surface of critical infrastructures, enterprise networks, and personal devices. Quick propagation of cyber threats, driven by sophisticated adversarial attacks including evasion[8, 82], data poisoning[21], and backdoor insertions[20, 21], weakened traditional security measures across domains including intrusion detection systems (IDS), Internet of Things (IoT) security, and autonomous networks [19, 82, 127, 138]. These attacks exploit machine learning vulnerabilities, vastly expanding attack surfaces amid the proliferation of IoT devices and distributed systems[35, 58, 59]. Generative Adversarial Networks (GANs), first introduced by Goodfellow et al.[1], have transitioned from synthetic data generation to essential defenses, enabling adversarial scenario simulation, dataset augmentation, and model resilience enhancement[16, 32, 33, 139]. Variants like Conditional GANs (CGANs) and Wasserstein GANs (WGANs) excel in producing realistic samples for anomaly detection and IDS robustness[27, 169, 170], outperforming static signature-based approaches against dynamic threats[60, 169, 173]. Yet, GAN applications in Cybersecurity are fragmented, grappling with training instability, dataset scarcity, edge-device computational constraints, and dual-use risks where GANs facilitate both defenses and advanced attacks[11, 13, 24, 34, 44, 61-63, 79, 80]. Recent advancements, such as GAN-IF models for intrusion detection and AR-GAN for autonomous vehicle defenses, underscore potential in real-time mitigation, but ethical frameworks and unified evaluations remain deficient[78, 81]. This gap necessitates a systematic literature review (SLR) to consolidate GAN architectures, applications, and performance metrics for proactive adversarial defense. 1
arXiv.org Artificial Intelligence
Oct-1-2025
- Country:
- Asia
- China > Beijing
- Beijing (0.04)
- Middle East > Kuwait
- Ahmadi Governorate > Al Ahmadi (0.04)
- Myanmar > Tanintharyi Region
- Dawei (0.04)
- China > Beijing
- South America > Argentina
- Patagonia > Río Negro Province > Viedma (0.04)
- Asia
- Genre:
- Overview (1.00)
- Research Report
- Experimental Study (0.46)
- New Finding (0.67)
- Industry:
- Government > Military
- Cyberwarfare (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Military
- Technology:
- Information Technology
- Artificial Intelligence > Machine Learning
- Neural Networks > Deep Learning (1.00)
- Performance Analysis > Accuracy (0.93)
- Communications > Networks (1.00)
- Data Science > Data Mining (1.00)
- Security & Privacy (1.00)
- Artificial Intelligence > Machine Learning
- Information Technology