2022
DOI: 10.1016/j.cose.2022.102632
|View full text |Cite
|
Sign up to set email alerts
|

Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 44 publications
0
9
0
1
Order By: Relevance
“…An important consideration when converting from time series to graph structure is determining a fixed time interval to use to sample the network flow to avoid creating a graph that is too large to input/train by a trained model. 8 Xiao et. al.…”
Section: Related Workmentioning
confidence: 99%
“…An important consideration when converting from time series to graph structure is determining a fixed time interval to use to sample the network flow to avoid creating a graph that is too large to input/train by a trained model. 8 Xiao et. al.…”
Section: Related Workmentioning
confidence: 99%
“…Anomalous nodes → modeling stochasticity and multi-scale ST dependency GCN and GRU DEGCN [50] To capture node-and global-level patterns → DGCN and GGRU GCN alone TDG with GCN [51] Malicious connections on traffic → extracting TDGs graph. It used the GCN encoder and the deconvolutional decoder.…”
Section: Gcn and Drnn-based Gae H-vgrae [49]mentioning
confidence: 99%
“…Zola et al [51] proposed a graph-based approach to detect malicious connections on traffic networks. Specifically, in the first stage, a temporal dissection operation was used to split the entire network information into time intervals and to extract Traffic Dispersion Graphs (TDGs).…”
Section: ) Anomalous Node Detectionmentioning
confidence: 99%
“…Due to its usefulness and importance in detecting a class type, the IGR [28] is also employed as a weight for attributes in this work (2).…”
Section: Information Gainmentioning
confidence: 99%
“…By overwhelming the infrastructure that surrounds the internet traffic flow, a DoS attack is a malicious technique that interferes with the regular traffic and networking operations of a targeted server. The rate and volume of network traffic sent to the target closely correlate with the attack's severity [2].…”
Section: Introductionmentioning
confidence: 99%