Graph Representation Learning for Context-Aware Network Intrusion Detection

被引:2
|
作者
Premkumar, Augustine [1 ,2 ]
Schneider, Madeleine [2 ]
Spivey, Carlton [1 ,2 ]
Pavlik, John A. [2 ]
Bastian, Nathaniel D. [1 ,2 ]
机构
[1] US Mil Acad, Mathemat Sci Dept, West Point, NY 10996 USA
[2] US Mil Acad, Army Cyber Inst, West Point, NY 10996 USA
关键词
Graph Representation Learning; Network Intrusion Detection; Deep Learning; Context-awareness;
D O I
10.1117/12.2663162
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting malicious activity using a network intrusion detection system (NIDS) is an ongoing battle for the cyber defender. Increasingly, cyber-attacks are sophisticated and occur rapidly, necessitating the use of machine/deep learning (ML/DL) techniques for network intrusion detection. Traditional ML/DL techniques for NIDS classifiers, however, are often unable to sufficiently find context-driven similarities between the various network flows and/or packet captures. In this work, we leverage graph representation learning (GRL) techniques to successfully detect adversarial intrusions by exploiting the graph structure of NIDS data to derive context awareness, as graphs are a universal language for describing entities and their relationships. We explore several methods for NIDS data graph representation at both the network flow and packet level utilizing the CIC-IDS2017 dataset. We leverage graph neural networks and graph embedding algorithms to create a context-aware network intrusion detection system. Results indicate that adding context derived from GRL improves performance for detecting attacks. Our highest-scoring classifier incorporated both GNN embeddings and flow-level features and achieved an accuracy of 99.9%. Adding GRL methods to augment the flow/packet features improved accuracy by as much as 52.41%.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Context-aware Sampling of Large Networks via Graph Representation Learning
    Zhou, Zhiguang
    Shi, Chen
    Shen, Xilong
    Cai, Lihong
    Wang, Haoxuan
    Liu, Yuhua
    Zhao, Ying
    Chen, Wei
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2021, 27 (02) : 1709 - 1719
  • [2] Context-Aware Graph Label Propagation Network for Saliency Detection
    Ji, Wei
    Li, Xi
    Wei, Lina
    Wu, Fei
    Zhuang, Yueting
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 29 : 8177 - 8186
  • [3] Enhanced Semantic Representation Learning for Sarcasm Detection by Integrating Context-Aware Attention and Fusion Network
    Hao, Shufeng
    Yao, Jikun
    Shi, Chongyang
    Zhou, Yu
    Xu, Shuang
    Li, Dengao
    Cheng, Yinghan
    ENTROPY, 2023, 25 (06)
  • [4] Graph Neural Network for Context-Aware Recommendation
    Sattar, Asma
    Bacciu, Davide
    NEURAL PROCESSING LETTERS, 2023, 55 (05) : 5357 - 5376
  • [5] Graph Neural Network for Context-Aware Recommendation
    Asma Sattar
    Davide Bacciu
    Neural Processing Letters, 2023, 55 : 5357 - 5376
  • [6] CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem
    Micale, Davide
    Costantino, Gianpiero
    Matteucci, Ilaria
    Fenzl, Florian
    Rieke, Roland
    Patane, Giuseppe
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1211 - 1218
  • [7] Spoken language understanding via graph contrastive learning on the context-aware graph convolutional network
    Cao, Ze
    Liu, Jian-Wei
    PATTERN ANALYSIS AND APPLICATIONS, 2024, 27 (04)
  • [8] A context-aware robust intrusion detection system: a reinforcement learning-based approach
    Sethi, Kamalakanta
    Rupesh, E. Sai
    Kumar, Rahul
    Bera, Padmalochan
    Madhav, Y. Venu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (06) : 657 - 678
  • [9] TBNet: a context-aware graph network for tuberculosis diagnosis
    Lu, Si-Yuan
    Wang, Shui-Hua
    Zhang, Xin
    Zhang, Yu-Dong
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2022, 214
  • [10] A context-aware robust intrusion detection system: a reinforcement learning-based approach
    Kamalakanta Sethi
    E. Sai Rupesh
    Rahul Kumar
    Padmalochan Bera
    Y. Venu Madhav
    International Journal of Information Security, 2020, 19 : 657 - 678