2021
DOI: 10.21203/rs.3.rs-515900/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Multiple Classification Algorithm Based on Graph Convolutional Neural Network for Intrusion Detection

Abstract: In order to improve the recognition performance of intrusion detection, a graph convolutional neural network for multiple classification intrusion detection is proposed, named as GCNID. Firstly, the detection data are preprocessed by numerical and normalized, so that the disadvantage effect of numerical differences among various features can be reduced. Then, the adjacency matrix for intrusion data in GCIND is constructed by the k-nearest neighbor method, which utilizes the Euclide distance between different f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Subsequently, the anomalous sensor nodes in the graph are identified with GAT. Liu et al [11] proposed a graph generation approach to create knn graphs for each flow instance. This approach uses nodes to represent features, calculates the Euclidean distance between features, and adds undirected edges between nodes based on the k-nearest neighbor algorithm.…”
Section: Plos Onementioning
confidence: 99%
See 4 more Smart Citations
“…Subsequently, the anomalous sensor nodes in the graph are identified with GAT. Liu et al [11] proposed a graph generation approach to create knn graphs for each flow instance. This approach uses nodes to represent features, calculates the Euclidean distance between features, and adds undirected edges between nodes based on the k-nearest neighbor algorithm.…”
Section: Plos Onementioning
confidence: 99%
“…The work in [10] suffers the same issue as the GLASS. The approach in [11] takes a more fine-grained approach and creates graphs for each session. The traffic trace graph in [12] has the problem that it may connect normal and attack nodes, resulting in low detection accuracy.…”
Section: Plos Onementioning
confidence: 99%
See 3 more Smart Citations