N-STGAT: Spatio-Temporal Graph Neural Network Based Network Intrusion Detection for Near-Earth Remote Sensing

被引:8
作者
Wang, Yalu [1 ]
Li, Jie [2 ]
Zhao, Wei [3 ]
Han, Zhijie [4 ]
Zhao, Hang [5 ]
Wang, Lei [6 ]
He, Xin [4 ]
机构
[1] Henan Univ, Sch Comp & Informat Engn, Kaifeng 475004, Peoples R China
[2] Zhengzhou Univ Aeronaut, Sch Intelligent Engn, Zhengzhou 450046, Peoples R China
[3] Henan Univ, Miami Coll, Kaifeng 475004, Peoples R China
[4] Henan Univ, Sch Software, Kaifeng 475004, Peoples R China
[5] Henan Univ, State Key Lab Crop Stress Adaptat & Improvement, Kaifeng 475004, Peoples R China
[6] Henan Univ, Coll Agr, Kaifeng 475004, Peoples R China
关键词
near-Earth remote sensing; network intrusion; temporal features; spatio-temporal graph attention network; ARCHITECTURE;
D O I
10.3390/rs15143611
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
With the rapid development of the Internet of Things (IoT)-based near-Earth remote sensing technology, the problem of network intrusion for near-Earth remote sensing systems has become more complex and large-scale. Therefore, seeking an intelligent, automated, and robust network intrusion detection method is essential. Many researchers have researched network intrusion detection methods, such as traditional feature-based and machine learning methods. In recent years, network intrusion detection methods based on graph neural networks (GNNs) have been proposed. However, there are still some practical issues with these methods. For example, they have not taken into consideration the characteristics of near-Earth remote sensing systems, the state of the nodes, and the temporal features. Therefore, this article analyzes the factors of existing near-Earth remote sensing systems and proposes a spatio-temporal graph attention network (N-STGAT) that considers the state of nodes and applies them to the network intrusion detection of near-Earth remote sensing systems. Finally, the proposed method in this article is validated using the latest flow-based datasets NF-BoT-IoT-v2 and NF-ToN-IoT-v2. The results demonstrate that the binary classification accuracy for network intrusion detection exceeds 99%, while the multi-classification accuracy exceeds 93%. These findings provide substantial evidence that the proposed method outperforms existing intrusion detection techniques.
引用
收藏
页数:20
相关论文
共 40 条
  • [1] Exploiting dynamic spatio-temporal graph convolutional neural networks for citywide traffic flows prediction
    Ali, Ahmad
    Zhu, Yanmin
    Zakarya, Muhammad
    [J]. NEURAL NETWORKS, 2022, 145 : 233 - 247
  • [2] Exploiting dynamic spatio-temporal correlations for citywide traffic flow prediction using attention based neural networks
    Ali, Ahmad
    Zhu, Yanmin
    Zakarya, Muhammad
    [J]. INFORMATION SCIENCES, 2021, 577 : 852 - 870
  • [3] Surveying Port Scans and Their Detection Methodologies
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. COMPUTER JOURNAL, 2011, 54 (10) : 1565 - 1581
  • [4] A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications
    Cai, HongYun
    Zheng, Vincent W.
    Chang, Kevin Chen-Chuan
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (09) : 1616 - 1637
  • [5] Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge
    Casas, Pedro
    Mazel, Johan
    Owezarski, Philippe
    [J]. COMPUTER COMMUNICATIONS, 2012, 35 (07) : 772 - 783
  • [6] Anomal-E: A self-supervised network intrusion detection system based on graph neural networks
    Caville, Evan
    Lo, Wai Weng
    Layeghy, Siamak
    Portmann, Marius
    [J]. KNOWLEDGE-BASED SYSTEMS, 2022, 258
  • [7] Remote Sensing Big Data for Water Environment Monitoring: Current Status, Challenges, and Future Prospects
    Chen, Jinyue
    Chen, Shuisen
    Fu, Rao
    Li, Dan
    Jiang, Hao
    Wang, Chongyang
    Peng, Yongshi
    Jia, Kai
    Hicks, Brendan J.
    [J]. EARTHS FUTURE, 2022, 10 (02)
  • [8] Discovering Attack Scenarios via Intrusion Alert Correlation Using Graph Convolutional Networks
    Cheng, Qiumei
    Wu, Chunming
    Zhou, Shiying
    [J]. IEEE COMMUNICATIONS LETTERS, 2021, 25 (05) : 1564 - 1567
  • [9] An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
    Churcher, Andrew
    Ullah, Rehmat
    Ahmad, Jawad
    Ur Rehman, Sadaqat
    Masood, Fawad
    Gogate, Mandar
    Alqahtani, Fehaid
    Nour, Boubakr
    Buchanan, William J.
    [J]. SENSORS, 2021, 21 (02) : 1 - 32
  • [10] Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions
    Ferrag, Mohamed Amine
    Shu, Lei
    Friha, Othmane
    Yang, Xing
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (03) : 407 - 436