ResACAG: A graph neural network based intrusion detection

被引:1
作者
Zhang, Anqin [1 ,2 ]
Zhao, Yan [1 ]
Zhou, Chenhao [1 ]
Zhang, Ting [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 200090, Peoples R China
[2] Shantou Univ, Inst Local Govt Dev, Shan Tou 515063, Peoples R China
基金
中国国家自然科学基金;
关键词
Graph neural networks; Network intrusion detection; Adaptive sampling; A context broadcasting mechanism;
D O I
10.1016/j.compeleceng.2024.109956
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous growth of network throughput, the field of network security is facing increasingly severe challenges. To address this challenge, this paper proposes a network intrusion detection system based on Graph Neural Network (GNN): Residual Adaptive Context- Aware Graph (ResACAG). GNN, as an emerging branch in the field of deep learning, has shown powerful performance in processing graph-structured data. Although the application of GNN in network intrusion detection is still in its early stages, existing research results have demonstrated its promising prospects. The proposed method adopts an improved self- attention mechanism to capture key information of neighboring edges' features in the network intrusion graph and perform multi-scale adaptive fusion with graph topology features. It introduces a context broadcasting mechanism to achieve global interaction and increase model capacity. Residual connections are additionally added to enhance the network's expressive power. Moreover, adaptive sampling of neighboring edges is proposed, significantly improving the model's generalization ability. The experimental results on two public datasets and one private dataset validate the excellent performance of our method, showcasing not only the significant potential of GNN in the field of network intrusion detection but also providing insights for future research.
引用
收藏
页数:16
相关论文
共 27 条
[1]   A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection [J].
Al-Turaiki, Isra ;
Altwaijry, Najwa .
BIG DATA, 2021, 9 (03) :233-252
[2]   An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection [J].
Aldwairi, Tamer ;
Perera, Dilina ;
Novotny, Mark A. .
COMPUTER NETWORKS, 2018, 144 :111-119
[3]  
Chang LY, 2021, Arxiv, DOI arXiv:2111.13597
[4]  
Ding X, 2023, IEEE T PATTERN ANAL, V45, P8143, DOI [10.1109/TPAMI.2022.3228915, 10.1109/TCC.2022.3150766]
[5]   Hyperspectral Image Restoration Using Low-Rank Tensor Recovery [J].
Fan, Haiyan ;
Chen, Yunjin ;
Guo, Yulan ;
Zhang, Hongyan ;
Kuang, Gangyao .
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2017, 10 (10) :4589-4604
[6]   node2vec: Scalable Feature Learning for Networks [J].
Grover, Aditya ;
Leskovec, Jure .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :855-864
[7]  
Hamaguchi T, 2017, PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P1802
[8]  
Hamilton WL, 2017, ADV NEUR IN, V30
[9]  
Hochreiter S, 1997, NEURAL COMPUT, V9, P1735, DOI [10.1162/neco.1997.9.1.1, 10.1007/978-3-642-24797-2]
[10]  
Hyeon-Woo N, 2024, Arxiv, DOI arXiv:2210.08457