NE-GConv: A lightweight node edge graph convolutional network for intrusion detection
Resource constraint devices are now the first choice of cyber criminals for launching
cyberattacks. Network Intrusion Detection Systems (NIDS) play a critical role in the detection …
cyberattacks. Network Intrusion Detection Systems (NIDS) play a critical role in the detection …
RANet: Network intrusion detection with group-gating convolutional neural network
X Zhang, F Yang, Y Hu, Z Tian, W Liu, Y Li… - Journal of Network and …, 2022 - Elsevier
With the rapid increase of human activities in cyberspace, various network intrusions are
tended to be frequent and hidden. Network intrusion detection (NID) has attracted more and …
tended to be frequent and hidden. Network intrusion detection (NID) has attracted more and …
Graph neural networks for intrusion detection: A survey
T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges
Intrusion detection systems (IDS) play a crucial role in maintaining network security. With the
increasing sophistication of cyber attack methods, traditional detection approaches are …
increasing sophistication of cyber attack methods, traditional detection approaches are …
CANET: A hierarchical cnn-attention model for network intrusion detection
K Ren, S Yuan, C Zhang, Y Shi, Z Huang - Computer Communications, 2023 - Elsevier
Abstract Network Intrusion Detection (NID) is an important defense strategy in modern
networks to detect malicious activities in large-scale cyberspace. The current NID methods …
networks to detect malicious activities in large-scale cyberspace. The current NID methods …
Graph-based solutions with residuals for intrusion detection: The modified e-graphsage and e-resgat algorithms
L Chang, P Branco - arXiv preprint arXiv:2111.13597, 2021 - arxiv.org
The high volume of increasingly sophisticated cyber threats is drawing growing attention to
cybersecurity, where many challenges remain unresolved. Namely, for intrusion detection …
cybersecurity, where many challenges remain unresolved. Namely, for intrusion detection …
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection
With the continuous occurrence of cybersecurity incidents, network intrusion detection has
become one of the most critical issues in cyber ecosystems. Although previous machine …
become one of the most critical issues in cyber ecosystems. Although previous machine …
A new concatenated multigraph neural network for iot intrusion detection
The last few years have seen a high volume of sophisticated cyber-attacks leading to
financial instability and privacy breaches. This reveals the need for a Network Intrusion …
financial instability and privacy breaches. This reveals the need for a Network Intrusion …
Anomal-E: A self-supervised network intrusion detection system based on graph neural networks
This paper investigates graph neural networks (GNNs) applied for self-supervised intrusion
and anomaly detection in computer networks. GNNs are a deep learning approach for graph …
and anomaly detection in computer networks. GNNs are a deep learning approach for graph …
E-graphsage: A graph neural network based intrusion detection system for iot
This paper presents a new Network Intrusion Detection System (NIDS) based on Graph
Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks …
Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks …