Affiliation:
1. Department of Information and Telecommunication Engineering, Soongsil University, Seoul 06978, Republic of Korea
2. School of Electronic Engineering, Soongsil University, Seoul 06978, Republic of Korea
3. Department of AI Convergence Security, Soongsil University, Seoul 06978, Republic of Korea
Abstract
With the proliferation of the Internet, network complexities for both commercial and state organizations have significantly increased, leading to more sophisticated and harder-to-detect network attacks. This evolution poses substantial challenges for intrusion detection systems, threatening the cybersecurity of organizations and national infrastructure alike. Although numerous deep learning techniques such as convolutional neural networks (CNNs), recurrent neural networks (RNNs), and graph neural networks (GNNs) have been applied to detect various network attacks, they face limitations due to the lack of standardized input data, affecting model accuracy and performance. This paper proposes a novel preprocessing method for flow data from network intrusion detection systems (NIDSs), enhancing the efficacy of a graph neural network model in malicious flow detection. Our approach initializes graph nodes with data derived from flow features and constructs graph edges through the analysis of IP relationships within the system. Additionally, we propose a new graph model based on the combination of the graph neural network (GCN) model and SAGEConv, a variant of the GraphSAGE model. The proposed model leverages the strengths while addressing the limitations encountered by the previous models. Evaluations on two IDS datasets, CICIDS-2017 and UNSW-NB15, demonstrate that our model outperforms existing methods, offering a significant advancement in the detection of network threats. This work not only addresses a critical gap in the standardization of input data for deep learning models in cybersecurity but also proposes a scalable solution for improving the intrusion detection accuracy.
Funder
National Research Foundation of Korea
MSIT (Ministry of Science and ICT), Korea, under the Convergence Security Core Talent Training Business Support Program
Reference49 articles.
1. Intrusion detection system: A comprehensive review;Liao;J. Netw. Comput. Appl.,2013
2. False alarm minimization techniques in signature-based intrusion detection systems: A survey;Hubballi;Comput. Commun.,2014
3. Network Anomaly Detection: Methods, Systems and Tools;Bhuyan;IEEE Commun. Surv. Tutor.,2014
4. Survey of intrusion detection systems: Techniques, datasets and challenges;Khraisat;Cybersecurity,2019
5. Do, D.P., Kim, T., Na, J., Kim, J., Lee, K., Cho, K., and Hwang, W. (2024, January 17–21). D3T: Distinctive Dual-Domain Teacher Zigzagging Across RGB-Thermal Gap for Domain-Adaptive Object Detection. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献