This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusion and anomaly detection. GNNs are a deep learning approach for graph-based data that incorporate graph structures into learning to generalise graph representations and output embeddings. As network flows are naturally graph-based, GNNs are a suitable fit for analysing and learning network behaviour. The majority of current implementations of GNN-based Network Intrusion Detection Systems (NIDSs) rely heavily on labelled network traffic which can not only restrict the amount and structure of input traffic, but also the NIDSs potential to adapt to unseen attacks. To overcome these restrictions, we present Anomal-E, a GNN approach to intrusion a...
Recently data mining methods have gained importance in addressing network security issues, including...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
In today's interconnected digital landscape, safeguarding computer networks against unauthorized acc...
The last decades have seen a growth in the number of cyber-attacks with severe economic and privacy ...
International Conference on Applied Cryptography and Network Security (ACNS 2023)International audi...
The last few years have seen an increasing wave of attacks with serious economic and privacy damages...
Graphs are used widely to model complex systems, and detecting anomalies in a graph is an important ...
Detecting malicious activity using a network intrusion detection system (NIDS) is an ongoing battle ...
Graph anomaly detection (GAD) has gained increasing attention in recent years due to its critical ap...
Network traffic analysis is an important cybersecurity task, which helps to classify anomalous, pote...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
International audienceWith the continuous growing level of dynamicity, heterogeneity, and complexity...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
With the increasing dependency of daily life over computer networks, the importance of these network...
Intrusion detection systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Recently data mining methods have gained importance in addressing network security issues, including...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
In today's interconnected digital landscape, safeguarding computer networks against unauthorized acc...
The last decades have seen a growth in the number of cyber-attacks with severe economic and privacy ...
International Conference on Applied Cryptography and Network Security (ACNS 2023)International audi...
The last few years have seen an increasing wave of attacks with serious economic and privacy damages...
Graphs are used widely to model complex systems, and detecting anomalies in a graph is an important ...
Detecting malicious activity using a network intrusion detection system (NIDS) is an ongoing battle ...
Graph anomaly detection (GAD) has gained increasing attention in recent years due to its critical ap...
Network traffic analysis is an important cybersecurity task, which helps to classify anomalous, pote...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
International audienceWith the continuous growing level of dynamicity, heterogeneity, and complexity...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
With the increasing dependency of daily life over computer networks, the importance of these network...
Intrusion detection systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Recently data mining methods have gained importance in addressing network security issues, including...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
In today's interconnected digital landscape, safeguarding computer networks against unauthorized acc...