An explainable botnet detection model based on lightweight graph neural networks

被引:1
作者
He, Guofeng [1 ]
Zhu, Jianghua [2 ]
Shi, Yinong [3 ]
Yan, Ke [3 ,4 ]
Zheng, Xu [3 ,4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Peoples R China
[2] Univ Elect Sci & Technol China, Shenzhen Inst Adv Study, Chengdu, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
[4] KASH Inst Elect & Informat Ind, Kashi, Peoples R China
关键词
graph neural network; GNN; botnet detection; anomaly detection; network security;
D O I
10.1504/IJCSE.2025.144821
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Botnets represent a significant threat to the security of the current internet network environment. They can be employed to carry out various malicious activities, not only impairing the performance and security of individual devices but also causing extensive damage to the entire network. Therefore, efficient detection of botnets is essential for network security. In recent years, the mainstream approach to botnet detection has involved the use of graph neural network (GNN) models, aiming to fully utilise the graph-structured properties of network data. However, current GNN methods frequently struggle with complicated structures and lack interpretability. To address these issues, we have designed a new model based on graph isomorphism networks (GINs). This model significantly simplifies the complexity without compromising detection accuracy and introduces explainable techniques for analysing model weights and conducting subgraph mining. By leveraging the concept of graph isomorphism, our method can more precisely characterise and identify botnet features. Experimental results demonstrate that our model excels in both accuracy and interpretability, making it highly valuable for real-world network environment applications.
引用
收藏
页码:219 / 231
页数:14
相关论文
共 26 条
[1]  
Alothman B., 2018, INT J INTELL COMPUT, V9, P880, DOI [10.20533/ijicr.2042.4655.2018.0107, DOI 10.20533/IJICR.2042.4655.2018.0107]
[2]   A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems [J].
Cai, Zhipeng ;
Zheng, Xu .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (02) :766-775
[3]  
CAIDA, 2018, The caida ucsd anonymized internet traces
[4]  
Hamilton WL, 2017, ADV NEUR IN, V30
[5]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[6]  
Jelasity Mark., 2009, 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, P1
[7]  
Kaashoek MF, 2003, LECT NOTES COMPUT SC, V2735, P98
[8]  
Kingma DP., 2014, P 2 INT C LEARN REPR
[9]  
Maymounkov P, 2002, LECT NOTES COMPUT SC, V2429, P53
[10]  
McDermott CD, 2018, IEEE IJCNN