2023
DOI: 10.1109/access.2023.3275789
|View full text |Cite
|
Sign up to set email alerts
|

Graph Neural Networks for Intrusion Detection: A Survey

Abstract: Cyberattacks represent an ever-growing threat that has become a real priority for most organizations. Attackers use sophisticated attack scenarios to deceive defense systems in order to access private data or cause harm. Machine Learning (ML) and Deep Learning (DL) have demonstrate impressive results for detecting cyberattacks due to their ability to learn generalizable patterns from flat data. However, flat data fail to capture the structural behavior of attacks, which is essential for effective detection. Co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 114 publications
(148 reference statements)
0
3
0
Order By: Relevance
“…This precision in node detection surpasses traditional clustering methods, highlighting its criticality across diverse applications. For instance, in anomaly detection scenarios [51][52][53], the precise identification of unusual nodes is indispensable for tasks like fraud detection in financial transactions [54,55], intrusion detection in computer networks [56,57], and rare disease identification in biological networks [58,59]. Similarly, within network resource allocation frameworks [60,61]such as transportation or social networks, the ability to pinpoint nodes with specific characteristics is crucial for optimizing traffic flow, efficiently allocating resources, and upholding infrastructure integrity.…”
Section: -3-discussionmentioning
confidence: 99%
“…This precision in node detection surpasses traditional clustering methods, highlighting its criticality across diverse applications. For instance, in anomaly detection scenarios [51][52][53], the precise identification of unusual nodes is indispensable for tasks like fraud detection in financial transactions [54,55], intrusion detection in computer networks [56,57], and rare disease identification in biological networks [58,59]. Similarly, within network resource allocation frameworks [60,61]such as transportation or social networks, the ability to pinpoint nodes with specific characteristics is crucial for optimizing traffic flow, efficiently allocating resources, and upholding infrastructure integrity.…”
Section: -3-discussionmentioning
confidence: 99%
“…However, this model's practicality and scalability in real-world scenarios may be limited due to its requirement for a significant amount of training data and computing resources to achieve high accuracy. In another study [27], this paper explores using Graph Neural Networks (GNN) in network security intrusion detection. It focuses explicitly on applying graph representation learning techniques in intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…Despite their impressive performance, these methods share a limitation: CNN is primarily designed for grid data such as images and RNN performs well with sequential data (text), which represents as structured data. Therefore, these limitations will make these models ineffective when capturing flow data, which are organized as unstructured data [29,30].…”
Section: Related Workmentioning
confidence: 99%