File(s) under permanent embargo
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection
chapter
posted on 2023-02-08, 04:53 authored by S Xia, Sutharshan RajasegararSutharshan Rajasegarar, C Leckie, SM Erfani, J ChanSecuring communication networks has become increasingly important due to the growth in cybersecurity attacks, such as ransomware and denial of service attacks. In order to better observe, detect and track attacks in large networks, accurate and efficient anomaly detection algorithms are needed. In this paper, we address how the redundancy of the normal and attack traffic information available from network flow data can be exploited to develop a computationally efficient method for security attack detection. In this work, several sampling strategies are integrated with two graph neural network frameworks that have been employed to detect network attacks with reduced computational overhead, while achieving high detection accuracy. Using network flow data from several types of networks, such as Internet of Things data, the trade-off between model accuracy and computational efficiency for different attacks has been evaluated.
History
Volume
13787 LNCSPagination
105-119Publisher DOI
ISSN
0302-9743eISSN
1611-3349ISBN-13
9783031230196Publisher
Springer Nature SwitzerlandTitle of book
Network and System SecurityUsage metrics
Categories
No categories selectedLicence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC