NE-GConv: A lightweight node edge graph convolutional network for intrusion detection

被引:19
作者
Altaf, Tanzeela [1 ]
Wang, Xu [1 ]
Ni, Wei [2 ]
Liu, Ren Ping [1 ]
Braun, Robin [1 ]
机构
[1] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, Australia
[2] CSIRO, Data61, Canberra, ACT, Australia
关键词
GNN; NIDS; Lightweight; IoT networks; Computational complexity; NEURAL-NETWORKS;
D O I
10.1016/j.cose.2023.103285
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Resource constraint devices are now the first choice of cyber criminals for launching cyberattacks. Net-work Intrusion Detection Systems (NIDS) play a critical role in the detection of cyberattacks. The latest Graph Neural Network (GNN) technology, which learns over graph-structured data and thus can capture the impact of the network, has shown profuse results in network attack detection. However, most GNN approaches are limited to considering either node features or edge features. Our proposed approach over-comes this limitation by presenting a Node Edge-Graph Convolutional network (NE-GConv) framework which is equipped with both node and edge features. In particular, the network graph is formed by com-bining IP addresses and port numbers, and node and edge features are defined from packet contents and network flow data, respectively. Then, a two-layer model is designed, which implicitly performs edge clas-sification by explicitly using node and edge features. Hence, the model is sensitive to intrusions in both packet contents and network flow. Furthermore, our framework addresses the constraints of lightweight devices by employing a feature selection unit before the NE-GConv and minimizing the number of hidden layers in the NE-GConv. The experimental results demonstrate our model outperforms other GNN models in terms of accuracy and false-positive rate and is computationally efficient.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 38 条
[31]  
Shang W., 2016, 33 INT C MACHINE LEA, V5, P3276, DOI 10.48550/arxiv.1603.05201
[32]  
Srivastava N, 2014, J MACH LEARN RES, V15, P1929
[33]   Machine learning based solutions for security of Internet of Things (IoT): A survey [J].
Tahsien, Syeda Manjia ;
Karimipour, Hadis ;
Spachos, Petros .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 161
[34]  
Tailor S.A., 2021, ADAPTIVE FILTERS AGG
[35]   A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges [J].
Thakkar, Ankit ;
Lohiya, Ritika .
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2021, 28 (04) :3211-3243
[36]   DIoT: A Federated Self-learning Anomaly Detection System for IoT [J].
Thien Duc Nguyen ;
Marchal, Samuel ;
Miettinen, Markus ;
Fereidooni, Hossein ;
Asokan, N. ;
Sadeghi, Ahmad-Reza .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :756-767
[37]  
Thompson N. C., 2020, COMPUTATIONAL LIMITS, P1
[38]  
Yunyi Yang, 2021, 2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC), P31, DOI 10.1109/CTISC52352.2021.00013