2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) 2020
DOI: 10.1109/compsac48688.2020.0-165
|View full text |Cite
|
Sign up to set email alerts
|

Improving Intrusion Detection Systems using Zero-Shot Recognition via Graph Embeddings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…However, these works use the classical sub-efficient graph structure where nodes represent users and flows are the edges of the graph. Saber Zerhoudi et al [18] suggested enhancing intrusion detection systems using zero-shot learning. Their framework aims to improve insider threat detection performance for cases where historical user data is unavailable.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, these works use the classical sub-efficient graph structure where nodes represent users and flows are the edges of the graph. Saber Zerhoudi et al [18] suggested enhancing intrusion detection systems using zero-shot learning. Their framework aims to improve insider threat detection performance for cases where historical user data is unavailable.…”
Section: Related Workmentioning
confidence: 99%
“…The works in [11,13,16,18] use the classical graph representation which characterizes the users as nodes and communication flows as edges. This structure has several drawbacks, for example, it can be evaded since it is based on IP addresses, a pre-processing phase is required to make it consumable by GNN algorithms, and it does not provide relevant topological information about distributed or multi-steps attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Altae-Tran et al [25] proposed Iter-RefLSTM to allow better embedding functions to be designed and achieved accurate prediction of molecular toxicity with a small dataset through the use of one-shot learning. Zerhoudi et al [39] supplemented the dataset with semantic descriptions and used the graph embedding method to encode these semantic descriptions. e authors expanded the traditional IDS to realize zero-shot detection.…”
Section: Model Algorithmsmentioning
confidence: 99%
“…ere are recent incidents in which insiders have circumvented network security abound and insider threats have therefore received widespread attention. Zerhoudi et al [39] used graph embedding to integrate ZSL into an existing IDS for insider threat detection, and the overall architecture is shown in Figure 8. e lower part of the figure is the baseline system, and the upper part is an extension of the baseline system based on ZSL.…”
Section: Zero-shot Recognition With Graph Embeddingmentioning
confidence: 99%
“…In this paper written by [79], an intrusion detection system has been designed using zero-shot learning to improve insider threat detection performance for cases where user historical data is unavailable. In order to address this issue, they use graph embedding techniques to learn user vector representations that encode their position and relations in the organization's structure.…”
Section: Few-shot Learningmentioning
confidence: 99%