MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) 2019
DOI: 10.1109/milcom47813.2019.9020760
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 107 publications
(40 citation statements)
references
References 13 publications
0
40
0
Order By: Relevance
“…Public datasets/software GNN-based solutions Point anomaly Secure water treatment (SWaT), water distribution system (WADI), and critical infrastructure security showdown (CISS) datasets [123], [124], [125] Contextual anomaly SWaT, WADI and BATADAL datasets, as well as the Xcos software and epanetCPA toolbox [124], [125], [126], [127], [128] Collective anomaly LITNET-2020, M2M Using OPC UA, WUSTL-IIoT-2018 and KDD 1999 datasets, as well as the Xcos software and the epanetCPA tool [129], [130], [131] fault flaw overheat defect Fig. 6.…”
Section: Type Of Anomaliesmentioning
confidence: 99%
See 1 more Smart Citation
“…Public datasets/software GNN-based solutions Point anomaly Secure water treatment (SWaT), water distribution system (WADI), and critical infrastructure security showdown (CISS) datasets [123], [124], [125] Contextual anomaly SWaT, WADI and BATADAL datasets, as well as the Xcos software and epanetCPA toolbox [124], [125], [126], [127], [128] Collective anomaly LITNET-2020, M2M Using OPC UA, WUSTL-IIoT-2018 and KDD 1999 datasets, as well as the Xcos software and the epanetCPA tool [129], [130], [131] fault flaw overheat defect Fig. 6.…”
Section: Type Of Anomaliesmentioning
confidence: 99%
“…2) GNN solutions to anomaly detection: Jiang et al [129] devised a GCN-based anomaly detection model that can capture the entities' properties and structural information between them into graphs. With the proposed model, both abnormal behaviors of individuals and the associated anomalous groups can be detected.…”
Section: Collectivementioning
confidence: 99%
“…The dataset also consists of ground truth information needed to validate the approaches. The CMU CERT dataset is the most popular dataset being used in almost all the recent works in insider threat analysis [42][43][44][45].…”
Section: Datasetmentioning
confidence: 99%
“…However, it cannot resist attacks from the power utility (i.e., insider attacks). Such attacks can have devastating consequences, and are generally more challenging to detect and prevent [29]. As an insider attack may go undetected much longer than attacks from external sources, the consequences (e.g., legal and financial implications) will also be severe.…”
Section: Introductionmentioning
confidence: 99%