Graph Neural Networks for Intrusion Detection: A Survey

被引:25
|
作者
Bilot, Tristan [1 ,2 ,3 ]
Madhoun, Nour El [3 ,4 ]
Al Agha, Khaldoun [2 ]
Zouaoui, Anis [1 ]
机构
[1] Iriguard, F-92800 Puteaux La Defense, France
[2] Univ Paris Saclay, Lab Interdisciplinaire Sci Numer, CNRS, F-91190 Gif Sur Yvette, France
[3] ISEP, LISITE Lab, F-92130 Issy Les Moulineaux, France
[4] Sorbonne Univ, LIP6, CNRS, F-75005 Paris, France
关键词
Intrusion detection; Feature extraction; Training; Cyberattack; Graph neural networks; Computer crime; Surveys; Machine learning; Cyberattacks; cybersecurity; deep learning (DL); graph neural networks (GNNs); intrusion detection (IDS); machine learning (ML); ADVERSARIAL ATTACKS;
D O I
10.1109/ACCESS.2023.3275789
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberattacks represent an ever-growing threat that has become a real priority for most organizations. Attackers use sophisticated attack scenarios to deceive defense systems in order to access private data or cause harm. Machine Learning (ML) and Deep Learning (DL) have demonstrate impressive results for detecting cyberattacks due to their ability to learn generalizable patterns from flat data. However, flat data fail to capture the structural behavior of attacks, which is essential for effective detection. Contrarily, graph structures provide a more robust and abstract view of a system that is difficult for attackers to evade. Recently, Graph Neural Networks (GNNs) have become successful in learning useful representations from the semantic provided by graph-structured data. Intrusions have been detected for years using graphs such as network flow graphs or provenance graphs, and learning representations from these structures can help models understand the structural patterns of attacks, in addition to traditional features. In this survey, we focus on the applications of graph representation learning to the detection of network-based and host-based intrusions, with special attention to GNN methods. For both network and host levels, we present the graph data structures that can be leveraged and we comprehensively review the state-of-the-art papers along with the used datasets. Our analysis reveals that GNNs are particularly efficient in cybersecurity, since they can learn effective representations without requiring any external domain knowledge. We also evaluate the robustness of these techniques based on adversarial attacks. Finally, we discuss the strengths and weaknesses of GNN-based intrusion detection and identify future research directions.
引用
收藏
页码:49114 / 49139
页数:26
相关论文
共 50 条
  • [1] A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges
    Zhong, Meihui
    Lin, Mingwei
    Zhang, Chao
    Xu, Zeshui
    COMPUTERS & SECURITY, 2024, 141
  • [2] A survey of neural networks usage for intrusion detection systems
    Drewek-Ossowicka, Anna
    Pietrolaj, Mariusz
    Ruminski, Jacek
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 497 - 514
  • [3] A survey of neural networks usage for intrusion detection systems
    Anna Drewek-Ossowicka
    Mariusz Pietrołaj
    Jacek Rumiński
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 497 - 514
  • [4] Disinformation detection using graph neural networks: a survey
    Batool Lakzaei
    Mostafa Haghir Chehreghani
    Alireza Bagheri
    Artificial Intelligence Review, 57
  • [5] Disinformation detection using graph neural networks: a survey
    Lakzaei, Batool
    Chehreghani, Mostafa Haghir
    Bagheri, Alireza
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (03)
  • [6] Intrusion detection with neural networks
    Ryan, J
    Lin, MJ
    Miikkulainen, R
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 10, 1998, 10 : 943 - 949
  • [7] Intrusion Detection System Based on Integrated System Calls Graph and Neural Networks
    Mora-Gimeno, F. J.
    Mora-Mora, H.
    Volckaert, B.
    Atrey, A.
    IEEE ACCESS, 2021, 9 (09): : 9822 - 9833
  • [8] Graph Neural Networks for Network Intrusion Detection: An IP Behavioral Analysis Perspective
    Lee, Seon Woo
    Lee, Ju Young
    Lee, Tae Jin
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [9] Survey on Graph Neural Networks
    Gkarmpounis, Georgios
    Vranis, Christos
    Vretos, Nicholas
    Daras, Petros
    IEEE ACCESS, 2024, 12 : 128816 - 128832
  • [10] Graph Embedding for Graph Neural Network in Intrusion Detection System
    Dinh-Hau Tran
    Park, Minho
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 395 - 397