Towards Network Anomaly Detection Using Graph Embedding

被引:31
|
作者
Xiao, Qingsai [1 ,2 ]
Liu, Jian [1 ,2 ]
Wang, Quiyun [1 ]
Jiang, Zhengwei [1 ,2 ]
Wang, Xuren [1 ,3 ]
Yao, Yepeng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Capital Normal Univ, Coll Informat Engn, Beijing, Peoples R China
来源
关键词
Network anomaly detection; Graph embedding; Feature engineering; Unknown attack discovery;
D O I
10.1007/978-3-030-50423-6_12
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In the face of endless cyberattacks, many researchers have proposed machine learning-based network anomaly detection technologies. Traditional statistical features of network flows are manually extracted and rely heavily on expert knowledge, while classifiers based on statistical features have a high false-positive rate. The communications between different hosts forms graphs, which contain a large number of latent features. By combining statistical features with these latent features, we can train better machine learning classifiers. Therefore, we propose a novel network anomaly detection method that can use latent features in graphs and reduce the false positive rate of anomaly detection. We convert network traffic into first-order and second-order graph. The first-order graph learns the latent features from the perspective of a single host, and the second-order graph learns the latent features from a global perspective. This feature extraction process does not require manual participation or expert knowledge. We use these features to train machine learning algorithm classifiers for detecting network anomalies. We conducted experiments on two real-world datasets, and the results show that our approach allows for better learning of latent features and improved accuracy of anomaly detection. In addition, our method has the ability to detect unknown attacks.
引用
收藏
页码:156 / 169
页数:14
相关论文
共 50 条
  • [1] Adversarial regularized attributed network embedding for graph anomaly detection
    Tian, Chongrui
    Zhang, Fengbin
    Wang, Ruidong
    PATTERN RECOGNITION LETTERS, 2024, 183 : 111 - 116
  • [2] Network Anomaly Detection Using a Graph Neural Network
    Kisanga, Patrice
    Woungang, Isaac
    Traore, Issa
    Carvalho, Glaucio H. S.
    2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2023, : 61 - 65
  • [3] PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection
    Paudel, Ramesh
    Huang, H. Howie
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [4] A Graph Embedding Approach to User Behavior Anomaly Detection
    Modell, Alexander
    Larson, Jonathan
    Turcotte, Melissa
    Bertiger, Anna
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 2650 - 2655
  • [5] Enhancing Network Anomaly Detection Using Graph Neural Networks
    Marfo, William
    Tosh, Deepak K.
    Moore, Shirley V.
    2024 22ND MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE, MEDCOMNET 2024, 2024,
  • [6] Vessel Behavior Anomaly Detection Using Graph Attention Network
    Zhang, Yuanzhe
    Jin, Qiqiang
    Liang, Maohan
    Ma, Ruixin
    Liu, Ryan Wen
    NEURAL INFORMATION PROCESSING, ICONIP 2023, PT V, 2024, 14451 : 291 - 304
  • [7] Network Flow Based IoT Anomaly Detection Using Graph Neural Network
    Wei, Chongbo
    Xie, Gaogang
    Diao, Zulong
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT II, KSEM 2023, 2023, 14118 : 432 - 445
  • [8] Anomaly Detection in Cloud Computing using Knowledge Graph Embedding and Machine Learning Mechanisms
    Katerina Mitropoulou
    Panagiotis Kokkinos
    Polyzois Soumplis
    Emmanouel Varvarigos
    Journal of Grid Computing, 2024, 22
  • [9] Anomaly Detection in Cloud Computing using Knowledge Graph Embedding and Machine Learning Mechanisms
    Mitropoulou, Katerina
    Kokkinos, Panagiotis
    Soumplis, Polyzois
    Varvarigos, Emmanouel
    JOURNAL OF GRID COMPUTING, 2024, 22 (01)
  • [10] PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding
    Yang, Fan
    Xu, Jiacen
    Xiong, Chunlin
    Li, Zhou
    Zhang, Kehuan
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4355 - 4372