The last decades have seen a growth in the number of cyber-attacks with severe economic and privacy damages, which reveals the need for network intrusion detection approaches to assist in preventing cyber-attacks and reducing their risks. In this work, we propose a novel network representation as a graph of flows that aims to provide relevant topological information for the intrusion detection task, such as malicious behavior patterns, the relation between phases of multi-step attacks, and the relation between spoofed and pre-spoofed attackers' activities. In addition, we present a Graph Neural Network (GNN) based-framework responsible for exploiting the proposed graph structure to classify communication flows by assigning them a maliciousn...
Network traffic analysis is an important cybersecurity task, which helps to classify anomalous, pote...
Graph data, such as chemical networks and social networks, may be deemed confidential/private becaus...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
International Conference on Applied Cryptography and Network Security (ACNS 2023)International audi...
The last few years have seen an increasing wave of attacks with serious economic and privacy damages...
Distributed Denial of Service (DDoS) is one of the most common cyber-attacks and caused several dama...
This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusi...
Network security analysis based on attack graphs has been applied extensively in recent years. The r...
Abstract. Computer systems and networks suffer due to rapid increase of attacks, and in order to kee...
Cybersecurity has become an increasingly important topic in recent years, as concepts such as cloud ...
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, Io...
Detecting malicious activity using a network intrusion detection system (NIDS) is an ongoing battle ...
Given the distributed nature of the massively connected Things in IoT, IoT networks have been a pr...
Botnets are an ever-growing threat to private users, small companies, and even large corporations. T...
Reliable high-speed networks are essential to provide quality services to ever growing Internet appl...
Network traffic analysis is an important cybersecurity task, which helps to classify anomalous, pote...
Graph data, such as chemical networks and social networks, may be deemed confidential/private becaus...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
International Conference on Applied Cryptography and Network Security (ACNS 2023)International audi...
The last few years have seen an increasing wave of attacks with serious economic and privacy damages...
Distributed Denial of Service (DDoS) is one of the most common cyber-attacks and caused several dama...
This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusi...
Network security analysis based on attack graphs has been applied extensively in recent years. The r...
Abstract. Computer systems and networks suffer due to rapid increase of attacks, and in order to kee...
Cybersecurity has become an increasingly important topic in recent years, as concepts such as cloud ...
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, Io...
Detecting malicious activity using a network intrusion detection system (NIDS) is an ongoing battle ...
Given the distributed nature of the massively connected Things in IoT, IoT networks have been a pr...
Botnets are an ever-growing threat to private users, small companies, and even large corporations. T...
Reliable high-speed networks are essential to provide quality services to ever growing Internet appl...
Network traffic analysis is an important cybersecurity task, which helps to classify anomalous, pote...
Graph data, such as chemical networks and social networks, may be deemed confidential/private becaus...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...