2020
DOI: 10.1007/s12530-020-09347-0
|View full text |Cite
|
Sign up to set email alerts
|

A graph neural network method for distributed anomaly detection in IoT

Abstract: Recent IoT proliferation has undeniably affected the way organizational activities and business procedures take place within several IoT domains such as smart manufacturing, food supply chain, intelligent transportation systems, medical care infrastructures etc. The number of the interconnected edge devices has dramatically increased, creating a huge volume of transferred data susceptible to leakage, modification or disruption, ultimately affecting the security level, robustness and QoS of the attacked IoT eco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(34 citation statements)
references
References 46 publications
0
34
0
Order By: Relevance
“…Public datasets/software GNN-based solutions Point anomaly Secure water treatment (SWaT), water distribution system (WADI), and critical infrastructure security showdown (CISS) datasets [123], [124], [125] Contextual anomaly SWaT, WADI and BATADAL datasets, as well as the Xcos software and epanetCPA toolbox [124], [125], [126], [127], [128] Collective anomaly LITNET-2020, M2M Using OPC UA, WUSTL-IIoT-2018 and KDD 1999 datasets, as well as the Xcos software and the epanetCPA tool [129], [130], [131] fault flaw overheat defect Fig. 6.…”
Section: Type Of Anomaliesmentioning
confidence: 99%
See 1 more Smart Citation
“…Public datasets/software GNN-based solutions Point anomaly Secure water treatment (SWaT), water distribution system (WADI), and critical infrastructure security showdown (CISS) datasets [123], [124], [125] Contextual anomaly SWaT, WADI and BATADAL datasets, as well as the Xcos software and epanetCPA toolbox [124], [125], [126], [127], [128] Collective anomaly LITNET-2020, M2M Using OPC UA, WUSTL-IIoT-2018 and KDD 1999 datasets, as well as the Xcos software and the epanetCPA tool [129], [130], [131] fault flaw overheat defect Fig. 6.…”
Section: Type Of Anomaliesmentioning
confidence: 99%
“…Protogerou et al [131] developed a multi-agent system to exploit the collaborative and cooperative nature of intelligent agents for anomaly detection. Each agent will be implemented using a GNN that can learn the representation of physical networks.…”
Section: Collectivementioning
confidence: 99%
“…In [31], by using a test-bed, the range of attacks included sip, ssh, SSL, conn, DNS, and HTTP. In [39], by using a test-bed and CTU-13 datasets, the range of attacks included Infiltration attack, Propagation attack, worm infiltration, and worm propagation attack. In the study conducted by [43], the authors used the self-collection dataset and focused on interval attacks.…”
Section: Analysis Of Type Of Attacks Detectedmentioning
confidence: 99%
“…Table 2 shows the state-of-the-art machine learning algorithms according to three anomaly types. [17] LSTM [22] GNN [8] Multiple [10] AE-ANN [11] LSTM [12] AE-CNN [13] Ensemble [14] Unsupervised AE-CNN [6] Subspace [27] AE [25] AE [18] Self-learning [26] Semi-Supervised TCN [23] AE-LSTM [20] DNN [15] DBN [7]…”
Section: Detection Schemes Based On Machine Learning Algorithmsmentioning
confidence: 99%