2022
DOI: 10.1155/2022/5363764
|View full text |Cite
|
Sign up to set email alerts
|

E-minBatch GraphSAGE: An Industrial Internet Attack Detection Model

Abstract: The Industrial Internet has grown rapidly in recent years, and attacks against the Industrial Internet have also increased. When compared with the traditional Internet, the industrial Internet has a more complex network structure, and the traditional graph neural network attack behavior detection model cannot well adapt to the complex network environment. To make the model better adapt to the complex network environment, this paper proposes the E-minBatch GraphSAG model. First, the application layer source por… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Another improvement to E-GraphSAGE is provided by Lan et al [73], by introducing a pre-sampling step before training the model, resulting in smaller graphs and better scalability. The performance of this model has been compared to the original E-GraphSAGE along with other baselines on the UNSW-NB15 dataset where the accuracy and F1-score are slightly improved on both binary classification and multi-class classification tasks.…”
Section: ) Network Intrusion Detection With Flow Graphsmentioning
confidence: 99%
“…Another improvement to E-GraphSAGE is provided by Lan et al [73], by introducing a pre-sampling step before training the model, resulting in smaller graphs and better scalability. The performance of this model has been compared to the original E-GraphSAGE along with other baselines on the UNSW-NB15 dataset where the accuracy and F1-score are slightly improved on both binary classification and multi-class classification tasks.…”
Section: ) Network Intrusion Detection With Flow Graphsmentioning
confidence: 99%
“…In our previous work [29][30][31][32], we used the spatiotemporal features of traffic for anomaly detection, such as temporal features, combined features, and protocol features. In our algorithm, we not only use the features proposed by our previous work (such as the average number of packets of upstream and downstream traffic, the total size of upstream and downstream data packets, traffic duration, etc.…”
Section: Extraction Of Traffic Spatiotemporal Featuresmentioning
confidence: 99%
“…2) Limited Feature Extraction. Network flows have complex topological structures [12], including node connections, interaction patterns, and propagation behaviors. Conventional feature extraction methods focus on individual nodes or local features, making capturing and utilizing topological structure information difficult.…”
Section: Challenging Issues and Related Workmentioning
confidence: 99%