Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
GNN-IDS: Graph Neural Network based Intrusion Detection System
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Scientific Computing. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computational Science.ORCID iD: 0009-0003-5026-5947
Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Electrical Engineering, Signals and Systems. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Automatic control. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Systems and Control.ORCID iD: 0000-0001-5491-4068
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computational Science. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Scientific Computing.ORCID iD: 0000-0003-0302-6276
2024 (English)In: Proceedings of the 19th International Conference on Availability, Reliability and Security, New York, NY, USA: Association for Computing Machinery (ACM), 2024, article id 14Conference paper, Published paper (Refereed)
Abstract [en]

Intrusion detection systems (IDSs) are widely used to identify anomalies in computer networks and raise alarms on intrusive behaviors. ML-based IDSs generally take network traces or host logs as input to extract patterns from individual samples, whereas the inter-dependencies of network are often not captured and learned, which may result in large amounts of uncertain predictions, false positives, and false negatives. To tackle the challenges in intrusion detection, we propose a graph neural network-based intrusion detection system (GNN-IDS), which is data-driven and machine learning-empowered. In our proposed GNN-IDS, the attack graph and real-time measurements that represent static and dynamic attributes of computer networks, respectively, are incorporated and associated to represent complex computer networks. Graph neural networks are employed as the inference engine for intrusion detection. By learning network connectivity, graph neural networks can quantify the importance of neighboring nodes and node features to make more reliable predictions. Furthermore, by incorporating an attack graph, GNN-IDS could not only detect anomalies but also identify the malicious actions causing the anomalies. The experimental results on a use case network with two synthetic datasets (one generated from public IDS data) show that the proposed GNN-IDS achieves good performance. The results are analyzed from the aspects of uncertainty, explainability, and robustness.

Place, publisher, year, edition, pages
New York, NY, USA: Association for Computing Machinery (ACM), 2024. article id 14
Keywords [en]
Explainability, Graph Neural Network, Intrusion Detection System, Robustness, Uncertainty
National Category
Computer Systems
Research subject
Scientific Computing
Identifiers
URN: urn:nbn:se:uu:diva-544329DOI: 10.1145/3664476.3664515ISI: 001283894700038Scopus ID: 2-s2.0-85200392088ISBN: 9798400717185 (print)OAI: oai:DiVA.org:uu-544329DiVA, id: diva2:1917928
Conference
ARES 2024ARES, the 19th International Conference on Availability, Reliability and Security, JUL 30-AUG 02, 2024, Vienna, AUSTRIA
Projects
eSSENCE - An eScience CollaborationAvailable from: 2024-12-03 Created: 2024-12-03 Last updated: 2025-02-03Bibliographically approved

Open Access in DiVA

fulltext(1329 kB)41 downloads
File information
File name FULLTEXT01.pdfFile size 1329 kBChecksum SHA-512
5829f9672644abca39393023498e59244b7c90ffde2bec1c4b14a5dc197b70964da7b4fd786baad860e6443dddabc13a16b3a84bb421e19fbf35bccbd014fec6
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Sun, ZhenluTeixeira, AndréToor, Salman

Search in DiVA

By author/editor
Sun, ZhenluTeixeira, AndréToor, Salman
By organisation
Division of Scientific ComputingComputational ScienceSignals and SystemsAutomatic controlDivision of Systems and Control
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 41 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 42 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf