2020
DOI: 10.1007/978-3-030-50423-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Towards Network Anomaly Detection Using Graph Embedding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Public datasets/software GNN-based solutions Point anomaly Secure water treatment (SWaT), water distribution system (WADI), and critical infrastructure security showdown (CISS) datasets [123], [124], [125] Contextual anomaly SWaT, WADI and BATADAL datasets, as well as the Xcos software and epanetCPA toolbox [124], [125], [126], [127], [128] Collective anomaly LITNET-2020, M2M Using OPC UA, WUSTL-IIoT-2018 and KDD 1999 datasets, as well as the Xcos software and the epanetCPA tool [129], [130], [131] fault flaw overheat defect Fig. 6.…”
Section: Type Of Anomaliesmentioning
confidence: 99%
See 1 more Smart Citation
“…Public datasets/software GNN-based solutions Point anomaly Secure water treatment (SWaT), water distribution system (WADI), and critical infrastructure security showdown (CISS) datasets [123], [124], [125] Contextual anomaly SWaT, WADI and BATADAL datasets, as well as the Xcos software and epanetCPA toolbox [124], [125], [126], [127], [128] Collective anomaly LITNET-2020, M2M Using OPC UA, WUSTL-IIoT-2018 and KDD 1999 datasets, as well as the Xcos software and the epanetCPA tool [129], [130], [131] fault flaw overheat defect Fig. 6.…”
Section: Type Of Anomaliesmentioning
confidence: 99%
“…Statistical features of the data, such as network traffic are very important for detecting contextual anomalies, but they were usually carried out manually using expert knowledge. To avoid manual extraction of statistical features, Xiao et al [127] developed an approach with two graphs: first-order graph and second-order graph. The former learns the latent features from a single entity such as a host or a variable, and the latter learns the latent features from a global point of view.…”
Section: B Contextualmentioning
confidence: 99%
“…In [22] the authors devise an IDS that, based on a double graph embedding, expand an original set of features into a new one containing graph embedding information. Their overall approach is vaguely similar to ours, however the embedding procedure and classification algorithms are not related.…”
Section: A Related Workmentioning
confidence: 99%
“…Xiao et al [9] proposed a graph embedding approach to perform anomaly detection on network flows. The authors first converted the network flows into a first-order and secondorder graph.…”
Section: B Gnn-based Nidssmentioning
confidence: 99%