NE-GConv: A lightweight node edge graph convolutional network for intrusion detection

被引:19
作者
Altaf, Tanzeela [1 ]
Wang, Xu [1 ]
Ni, Wei [2 ]
Liu, Ren Ping [1 ]
Braun, Robin [1 ]
机构
[1] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, Australia
[2] CSIRO, Data61, Canberra, ACT, Australia
关键词
GNN; NIDS; Lightweight; IoT networks; Computational complexity; NEURAL-NETWORKS;
D O I
10.1016/j.cose.2023.103285
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Resource constraint devices are now the first choice of cyber criminals for launching cyberattacks. Net-work Intrusion Detection Systems (NIDS) play a critical role in the detection of cyberattacks. The latest Graph Neural Network (GNN) technology, which learns over graph-structured data and thus can capture the impact of the network, has shown profuse results in network attack detection. However, most GNN approaches are limited to considering either node features or edge features. Our proposed approach over-comes this limitation by presenting a Node Edge-Graph Convolutional network (NE-GConv) framework which is equipped with both node and edge features. In particular, the network graph is formed by com-bining IP addresses and port numbers, and node and edge features are defined from packet contents and network flow data, respectively. Then, a two-layer model is designed, which implicitly performs edge clas-sification by explicitly using node and edge features. Hence, the model is sensitive to intrusions in both packet contents and network flow. Furthermore, our framework addresses the constraints of lightweight devices by employing a feature selection unit before the NE-GConv and minimizing the number of hidden layers in the NE-GConv. The experimental results demonstrate our model outperforms other GNN models in terms of accuracy and false-positive rate and is computationally efficient.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 38 条
[1]  
Asif MK, 2013, 2013 IEEE BUSINESS ENGINEERING AND INDUSTRIAL APPLICATIONS COLLOQUIUM (BEIAC 2013), P140
[2]   Internet of Things (IoT): Smart and Secure Service Delivery [J].
Bertino, Elisa ;
Choo, Kim-Kwang Raymond ;
Georgakopolous, Dimitrios ;
Nepal, Surya .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
[3]  
Calders T, 2007, LECT NOTES ARTIF INT, V4702, P42
[4]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[5]   Machine Learning DDoS Detection for Consumer Internet of Things Devices [J].
Doshi, Rohan ;
Apthorpe, Noah ;
Feamster, Nick .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :29-35
[6]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[7]   Analysis of update delays in signature-based network intrusion detection systems [J].
Gascon, Hugo ;
Orfila, Agustin ;
Blasco, Jorge .
COMPUTERS & SECURITY, 2011, 30 (08) :613-624
[8]  
Gori M, 2005, IEEE IJCNN, P729
[9]   Gene selection for cancer classification using support vector machines [J].
Guyon, I ;
Weston, J ;
Barnhill, S ;
Vapnik, V .
MACHINE LEARNING, 2002, 46 (1-3) :389-422
[10]  
Hamilton WL, 2017, ADV NEUR IN, V30