2021
DOI: 10.48550/arxiv.2111.13597
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Graph-based Solutions with Residuals for Intrusion Detection: the Modified E-GraphSAGE and E-ResGAT Algorithms

Abstract: The high volume of increasingly sophisticated cyber threats is drawing growing attention to cybersecurity, where many challenges remain unresolved. Namely, for intrusion detection, new algorithms that are more robust, effective, and able to use more information are needed. Moreover, the intrusion detection task faces a serious challenge associated with the extreme class imbalance between normal and malicious traffics. Recently, graph-neural network (GNN) achieved state-of-the-art performance to model the netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Using four benchmark datasets, the simulation results show that the E-GraphSAGE performs better than ML-based classifiers such as XGBoost. Similarly, Chang and Branco [86] extend E-GraphSAGE by proposing an edge-based residual graph attention network (E-ResGAT). E-ResGAT uses an attention mechanism supporting edge features and embedding residual learning to enhance malicious traffic detection.…”
Section: Intrusive Detectionmentioning
confidence: 99%
“…Using four benchmark datasets, the simulation results show that the E-GraphSAGE performs better than ML-based classifiers such as XGBoost. Similarly, Chang and Branco [86] extend E-GraphSAGE by proposing an edge-based residual graph attention network (E-ResGAT). E-ResGAT uses an attention mechanism supporting edge features and embedding residual learning to enhance malicious traffic detection.…”
Section: Intrusive Detectionmentioning
confidence: 99%
“…the botnet malware try to launch DDoS attacks to the victims) as a more global view of the network and traffic flow is required. As a result, it is worth exploring the edge-based graph neural approaches such as E-GraphSAGE [40], E-ResGAT [41] to perform Android malware detection based on malicious network flows and combine with GNN-Based FCG's approaches for Android malware detection.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…Graph representation learning is a fast growing area of research that can be applied to various applications such as telecommunication and molecular networks. Recently, GNNs have achieved state-of-the-art performance in cyberattack detection, such as network intrusion detection [4,20].…”
Section: Introductionmentioning
confidence: 99%