NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2022
DOI: 10.1109/noms54207.2022.9789921
|View full text |Cite
|
Sign up to set email alerts
|

Pikachu: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…It labels a query as abnormal if it is not predicted well. PIKACHU [4] extracts temporal random walks from historical interactions to train an encoder for link prediction. It labels a query as abnormal if it is not predicted well.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It labels a query as abnormal if it is not predicted well. PIKACHU [4] extracts temporal random walks from historical interactions to train an encoder for link prediction. It labels a query as abnormal if it is not predicted well.…”
Section: Related Workmentioning
confidence: 99%
“…The essential differences between the existing algorithms are: (i) the types of queries they accept; (ii) the definition given to the notion of anomaly; and (iii) how the context is exploited. For example, numerous algorithms accept time-stamped edges as queries, yet they differ in the criterion used to label a query as abnormal: some do it when the query implies a sudden change in edge counts [1], node embeddings [2], or walk statistics [3], while others do it when the query cannot be well predicted from the past [4,5]. Algorithms addressing coarser resolution A group of servers usually exchange between them and with some external users.…”
Section: Introductionmentioning
confidence: 99%
“…Random walks have been successfully applied to a large range of domains such as recommender systems and computer vision [18]. Despite the current success of recent GNNs, random walks are still used in recent graph-based intrusion detection works [19], [20], [21], [22]. Indeed, these algorithms demonstrate strong capabilities at capturing graph information and node co-occurrence relations while using self-supervised embedding techniques, namely the graph structure and features are used as the label for the predictive task.…”
Section: B Random Walk-based Learningmentioning
confidence: 99%
“…Paudel et al [19] also leverage the temporal dimension of graphs for network-based anomaly detection. They propose PIKACHU, an unsupervised dynamic graph embedding technique that considers both the dynamic edges and nodes.…”
Section: ) Network Intrusion Detection With Authentication Graphsmentioning
confidence: 99%