Enhanced Network Security Protection through Data Analysis and Machine Learning: An Application of GraphSAGE for Anomaly Detection and Operational Intelligence

被引:0
作者
Lu Y. [1 ]
机构
[1] Shijiazhuang College of Applied Technology, Shijiazhuang
关键词
anomaly control; anomaly detection; data analysis; graph network algorithms; Graph Sample and Aggregation (GraphSAGE) model; machine learning; network security; operational intelligence;
D O I
10.20532/cit.2023.1005776
中图分类号
学科分类号
摘要
With the Internet's rapid expansion, network security challenges have become increasingly complex and prominent. Traditional protection methods, largely dependent on predefined rules and patterns, demonstrate limited effectiveness against sophisticated and unknown network attacks, failing to harness the full potential of extensive network data. This study addresses the challenges faced by modern cybersecurity, particularly the limitations of traditional defense methods in countering unknown and complex attacks, by proposing a solution that integrates data analysis and machine learning technologies. The focus of this research is placed on network security anomaly detection as well as on intelligent network operations and maintenance exception management based on graph network algorithms, aiming to enhance security defense capabilities and operational efficiency. Specifically, the main contributions and innovations of this paper include: 1. Innovations in sampling, aggregation, and loss functions within the Graph Sample and Aggregation (GraphSAGE) model to improve the accuracy and robustness of the model for network anomaly detection; 2. The introduction of a novel network anomaly root cause analysis and localization model, which, combined with an optimized root cause likelihood assessment method and search scheme, significantly enhances the speed and accuracy of anomaly localization; 3. The design of an integrated decision support system that can automatically adjust protection strategies as network conditions change, achieving a high level of automation and intelligence in cybersecurity management. This work not only provides effective technical support for network security protection but also opens new avenues for future cybersecurity research. ACM CCS (2012) Classification: Security and privacy → Network security → Denial-of-service attacks. © 2023, University of Zagreb Faculty of Electrical Engineering and Computing. All rights reserved.
引用
收藏
页码:233 / 250
页数:17
相关论文
共 19 条
  • [1] Putro P. A. W., Sensuse D. I., Review of Security Principles and Security Functions in Critical Information Infrastructure Protection, International Journal of Safety and Security Engineering, 12, 4, pp. 459-465, (2022)
  • [2] Vatambeti R., Mamidisetti G., Routing Attack Detection Using Ensemble Deep Learning Model for IioT, Information Dynamics and Applications, 2, 1, pp. 31-41, (2023)
  • [3] Jin M., Computer Network Information Security and Protection Strategy Based on Big Data Environment, International Journal of Information Technologies and Systems Approach, 16, 2, (2023)
  • [4] Ayanwola T., Et al., Enhancing Face Spoofing Attack Detection: Performance Evaluation of a VGG-19 CNN Model, Acadlore Transactions on AI and Machine Learning, 2, 2, pp. 84-98, (2023)
  • [5] Meng L., Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms, Mobile Information Systems, 2022, (2022)
  • [6] Ohwo O. B., Et al., Advancing DNS Performance through an Adaptive Transport Layer Security Model (ad-TLSM), Ingénierie des Systèmes d'Information, 28, 3, pp. 777-790, (2023)
  • [7] Yun K., Et al., A Network Security Approach based on Machine Learning, Proc. of the 2023 IEEE International Conference on Integrated Circuits and Communication Systems, pp. 1-5, (2023)
  • [8] Saha T., Et al., Machine Learning Assisted Security Analysis of 5G-network-connected Systems, IEEE Transactions on Emerging Topics in Computing, 10, 4, pp. 2006-2024, (2022)
  • [9] Alao D. O., Et al., The Need to Improve DNS Security Architecture: An Adaptive Security Approach, Information Dynamics and Applications, 2, 1, pp. 19-30, (2023)
  • [10] Prasad B., Ramachandram S., Prevention and Detection Mechanisms for Re-entrancy Attack and King of Ether Throne Attack for Ethereum Smart Contracts, Ingénierie des Systèmes d'Information, 27, 5, pp. 725-735, (2022)