Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3580305.3599238acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Free access

3D-IDS: Doubly Disentangled Dynamic Intrusion Detection

Published: 04 August 2023 Publication History

Abstract

Network-based intrusion detection system (NIDS) monitors network traffic for malicious activities, forming the frontline defense against increasing attacks over information infrastructures. Although promising, our quantitative analysis shows that existing methods perform inconsistently in declaring various unknown attacks (e.g., 9% and 35% F1 respectively for two distinct unknown threats for an SVM-based method) or detecting diverse known attacks (e.g., 31% F1 for the Backdoor and 93% F1 for DDoS for a GCN-based state-of-the-art method), and reveals that the underlying cause is entangled distributions of flow features. This motivates us to propose 3D-IDS, a novel method that aims to tackle the above issues through two-step feature disentanglements and a dynamic graph diffusion scheme. Specifically, we first disentangle traffic features by a non-parameterized optimization based on mutual information, automatically differentiating tens and hundreds of complex features of various attacks. Such differentiated features will be fed into a memory model to generate representations, which are further disentangled to highlight the attack-specific features. Finally, we use a novel graph diffusion method that dynamically fuses the network topology for spatial-temporal aggregation in evolving data streams. By doing so, we can effectively identify various attacks in encrypted traffics, including unknown threats and known ones that are not easily detected. Experiments show the superiority of our 3D-IDS. We also demonstrate that our two-step feature disentanglements benefit the explainability of NIDS.

Supplementary Material

MP4 File (ID#rtfp1416-2min-promo.mp4)
WARNING! When you are enjoying TikTok, Twitter, and Youtube transmitted by wireless networks, you are also exposed to high risk of intrusion attacks such as DDoS, MITM, etc.! Luckily, there is a network intrusion detection system (NIDS) to protect you from these malicious attacks. However, this paper have first found the "Bucket Effect" in existing NIDS, which poses a serious threat to NIDS performance. To this end, we dive into the underlying cause of this performance inconsistency and design a better NIDS. For more interesting details, please click this video!

References

[1]
Zeeshan Ahmad, Adnan Shahid Khan, Cheah Wai Shiang, Johari Abdullah, and Farhan Ahmad. 2021. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies 32, 1 (2021), e4150.
[2]
Shadi Aljawarneh, Monther Aldwairi, and Muneer Bani Yassein. 2018. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science 25 (2018), 152--160.
[3]
Abdullah Alsaedi, Nour Moustafa, Zahir Tari, Abdun Mahmood, and Adnan Anwar. 2020. TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems. Ieee Access 8 (2020), 165130--165150.
[4]
Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation learning: A review and new perspectives. IEEE transactions on pattern analysis and machine intelligence 35, 8 (2013), 1798--1828.
[5]
Siddharth Bhatia, Arjit Jain, Pan Li, Ritesh Kumar, and Bryan Hooi. 2021. MStream: Fast Anomaly Detection in Multi-Aspect Streams. In Proceedings of the Web Conference 2021. ACM. https://doi.org/10.1145/3442381.3450023
[6]
Bharat Bhushan and Gadadhar Sahoo. 2018. Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications 98 (2018), 2037--2077.
[7]
Christian Brodbeck and Jonathan Z Simon. 2020. Continuous speech processing. Current Opinion in Physiology 18 (2020), 25--31.
[8]
Evan Caville, Wai Weng Lo, Siamak Layeghy, and Marius Portmann. 2022. Anomal-E: A self-supervised network intrusion detection system based on graph neural networks. Knowledge-Based Systems 258 (2022), 110030. https: //doi.org/10.1016/j.knosys.2022.110030
[9]
Zoran Cekerevac, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. 2017. Internet of things and the man-in-the-middle attacks--security and economic risks. MEST Journal 5, 2 (2017), 15--25.
[10]
Ben Chamberlain, James Rowbottom, Maria I Gorinova, Michael Bronstein, Stefan Webb, and Emanuele Rossi. 2021. Grand: Graph neural diffusion. In International Conference on Machine Learning. PMLR, 1407--1418.
[11]
Junxiang Chen and Kayhan Batmanghelich. 2020. Weakly supervised disentanglement by pairwise similarities. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 3495--3502.
[12]
Qi Chen, Yifei Wang, Yisen Wang, Jiansheng Yang, and Zhouchen Lin. 2022. Optimization-induced graph implicit nonlinear diffusion. In International Conference on Machine Learning. PMLR, 3648--3661.
[13]
Fan RK Chung. 1997. Spectral graph theory. Vol. 92. American Mathematical Soc.
[14]
Israel Cohen, Yiteng Huang, Jingdong Chen, Jacob Benesty, Jacob Benesty, Jingdong Chen, Yiteng Huang, and Israel Cohen. 2009. Pearson correlation coefficient. Noise reduction in speech processing (2009), 1--4.
[15]
Weilin Cong, Yanhong Wu, Yuandong Tian, Mengting Gu, Yinglong Xia, Mehrdad Mahdavi, and Chun-cheng Jason Chen. 2021. Dynamic Graph Representation Learning via Graph Transformer Networks. arXiv preprint arXiv:2111.10447 (2021).
[16]
Elliot Creager, David Madras, Jörn-Henrik Jacobsen, Marissa Weis, Kevin Swersky, Toniann Pitassi, and Richard Zemel. 2019. Flexibly fair representation learning by disentanglement. In International conference on machine learning. PMLR, 1436--1445.
[17]
Leonardo De Moura and Nikolaj Bjørner. 2008. Z3: An efficient SMT solver. In Tools and Algorithms for the Construction and Analysis of Systems: 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings 14. Springer, 337--340.
[18]
Roberto Doriguzzi-Corin, Stuart Millar, Sandra Scott-Hayward, Jesus Martinezdel Rincon, and Domenico Siracusa. 2020. LUCID: A practical, lightweight deep learning solution for DDoS attack detection. IEEE Transactions on Network and Service Management 17, 2 (2020), 876--889.
[19]
Felix Erlacher and Falko Dressler. 2018. FIXIDS: A high-speed signature-based flow intrusion detection system. In NOMS 2018--2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, 1--8.
[20]
Mojtaba Eskandari, Zaffar Haider Janjua, Massimo Vecchio, and Fabio Antonelli. 2020. Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal 7, 8 (2020), 6882--6897.
[21]
Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, and Helge Janicke. 2022. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10 (2022), 40281--40306.
[22]
Robert S Fisher, J Helen Cross, Jacqueline A French, Norimichi Higurashi, Edouard Hirsch, Floor E Jansen, Lieven Lagae, Solomon L Moshé, Jukka Peltola, Eliane Roulet Perez, et al. 2017. Operational classification of seizure types by the International League Against Epilepsy: Position Paper of the ILAE Commission for Classification and Terminology. Epilepsia 58, 4 (2017), 522--530.
[23]
Leilani H Gilpin, David Bau, Ben Z Yuan, Ayesha Bajwa, Michael Specter, and Lalana Kagal. 2018. Explaining explanations: An approach to evaluating interpretability of machine learning. arXiv preprint arXiv:1806.00069 (2018), 118.
[24]
Muhammad W Gondal, Manuel Wüthrich, Ðorđe Miladinović, Francesco Locatello, Martin Breidt, Valentin Volchkov, Joel Akpo, Olivier Bachem, Bernhard Schölkopf, and Stefan Bauer. 2020. On the Transfer of Inductive Bias from Simulation to the Real World: a New Disentanglement Dataset. Advances in Neural Information Processing Systems 32 20 (2020), 15661--15672.
[25]
Fangda Gu, Heng Chang, Wenwu Zhu, Somayeh Sojoudi, and Laurent El Ghaoui. 2020. Implicit graph neural networks. Advances in Neural Information Processing Systems 33 (2020), 11984--11995.
[26]
Weikuo Guo, Huaibo Huang, Xiangwei Kong, and Ran He. 2019. Learning disentangled representation for cross-modal retrieval with deep mutual information estimation. In Proceedings of the 27th ACM International Conference on Multimedia. 1712--1720.
[27]
Xingzhi Guo, Baojian Zhou, and Steven Skiena. 2022. Subset Node Anomaly Tracking over Large Dynamic Graphs. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD '22). Association for Computing Machinery. https://doi.org/10.1145/3534678.3539389
[28]
William L Hamilton, Rex Ying, and Jure Leskovec. 2017. Representation learning on graphs: Methods and applications. arXiv preprint arXiv:1709.05584 (2017).
[29]
Irina Higgins, Loic Matthey, Arka Pal, Christopher Burgess, Xavier Glorot, Matthew Botvinick, Shakir Mohamed, and Alexander Lerchner. 2017. beta-vae: Learning basic visual concepts with a constrained variational framework. In International conference on learning representations.
[30]
Ning Hu, Zhihong Tian, Hui Lu, Xiaojiang Du, and Mohsen Guizani. 2021. A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks. International Journal of Machine Learning and Cybernetics 12, 11 (2021), 3129--3144.
[31]
Christiana Ioannou and Vasos Vassiliou. 2021. Network attack classification in IoT using support vector machines. Journal of Sensor and Actuator Networks 10, 3 (2021), 58.
[32]
Philokypros Ioulianou, Vasileios Vasilakis, Ioannis Moscholios, and Michael Logothetis. 2018. A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form (2018).
[33]
Marcus Kalander, Min Zhou, Chengzhi Zhang, Hanling Yi, and Lujia Pan. 2020. Spatio-temporal hybrid graph convolutional network for traffic forecasting in telecommunication networks. arXiv preprint arXiv:2009.09849 (2020).
[34]
Marcus Kalander, Min Zhou, Chengzhi Zhang, Hanling Yi, and Lujia Pan. 2020. Spatio-temporal hybrid graph convolutional network for traffic forecasting in telecommunication networks. arXiv preprint arXiv:2009.09849 (2020).
[35]
Patrick Gage Kelley, Saranga Komanduri, Michelle L Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Julio Lopez. 2012. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In 2012 IEEE symposium on security and privacy. IEEE, 523--537.
[36]
Isaiah J King and H Howie Huang. 2022. Euler: Detecting network lateral movement via scalable temporal link prediction. Network and Distributed Systems Security (NDSS) Symposium (2022).
[37]
Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull. 2019. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems 100 (2019), 779--796.
[38]
Sanjay Kumar, Ari Viinikainen, and Timo Hamalainen. 2016. Machine learning classification model for network based intrusion detection system. In 2016 11th international conference for internet technology and secured transactions (ICITST). IEEE, 242--249.
[39]
Wassila Lalouani and Mohamed Younis. 2021. Robust distributed intrusion detection system for edge of things. In 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, 01--06.
[40]
Arash Habibi Lashkari, Y Zang, G Owhuo, MSI Mamun, and GD Gil. 2017. CICFlowMeter. GitHub.[vid. 2021-08-10]. Dostupné z: https://github. com/ahlashkari/CICFlowMeter/blob/master/ReadMe. txt (2017).
[41]
Xin Li, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, and Anukool Lakhina. 2006. Detection and identification of network anomalies using sketch subspaces. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. 147--152.
[42]
Yuzhen Li, Renjie Li, Zhou Zhou, Jiang Guo, Wei Yang, Meijie Du, and Qingyun Liu. 2022. GraphDDoS: Effective DDoS Attack Detection Using Graph Neural Networks. In 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 1275--1280.
[43]
Tsung-Yi Lin, Priya Goyal, Ross Girshick, Kaiming He, and Piotr Dollár. 2017. Focal loss for dense object detection. In Proceedings of the IEEE international conference on computer vision. 2980--2988.
[44]
Zachary C Lipton. 2018. The mythos of model interpretability: In machine learning, the concept of interpretability is both important and slippery. Queue 16, 3 (2018), 31--57.
[45]
Gang Liu and Jiabao Guo. 2019. Bidirectional LSTM with attention mechanism and convolutional layer for text classification. Neurocomputing 337 (2019), 325--338
[46]
Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, and Marius Portmann. 2022. E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. In NOMS 2022--2022 IEEE/IFIP Network Operations and Management Symposium. IEEE, 1--9.
[47]
Francesco Locatello, Ben Poole, Gunnar Rätsch, Bernhard Schölkopf, Olivier Bachem, and Michael Tschannen. 2020. Weakly-supervised disentanglement without compromises. In International Conference on Machine Learning. PMLR, 6348--6359.
[48]
Li Ma, Ying Chai, Lei Cui, Dongchao Ma, Yingxun Fu, and Ailing Xiao. 2020. A deep learning-based DDoS detection framework for Internet of Things. In ICC 2020--2020 IEEE International Conference on Communications (ICC). IEEE, 1--6.
[49]
Mohammad Masdari and Hemn Khezri. 2020. A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Applied Soft Computing 92 (2020), 106301.
[50]
Anasua Mitra, Priyesh Vijayan, Ranbir Sanasam, Diganta Goswami, Srinivasan Parthasarathy, and Balaraman Ravindran. 2021. Semi-supervised deep learning for multiplex networks. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 1234--1244.
[51]
Nour Moustafa. 2019. New generations of internet of things datasets for cyberse-curity applications based machine learning: TON_IoT datasets. In Proceedings of the eResearch Australasia Conference, Brisbane, Australia. 21--25.
[52]
Nour Moustafa. 2021. A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustainable Cities and Society 72 (2021), 102994.
[53]
Nour Moustafa and Jill Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS). IEEE, 1--6.
[54]
Aldo Pareja, Giacomo Domeniconi, Jie Chen, Tengfei Ma, Toyotaro Suzumura, Hiroki Kanezashi, Tim Kaler, Tao Schardl, and Charles Leiserson. 2020. Evolvegcn: Evolving graph convolutional networks for dynamic graphs. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 5363--5370.
[55]
Chanyoung Park, Donghyun Kim, Jiawei Han, and Hwanjo Yu. 2020. Unsupervised attributed multiplex network embedding. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 5371--5378.
[56]
Pietro Perona and Jitendra Malik. 1990. Scale-space and edge detection using anisotropic diffusion. IEEE Transactions on pattern analysis and machine intelligence 12, 7 (1990), 629--639.
[57]
Michael Poli, Stefano Massaroli, Junyoung Park, Atsushi Yamashita, Hajime Asama, and Jinkyoo Park. 2019. Graph neural ordinary differential equations. arXiv preprint arXiv:1911.07532, 2019 (2019).
[58]
K Munivara Prasad. 2014. DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey. Global Journal of Computer Science and Technology 14, E7 (2014), 15--32.
[59]
Karl Ridgeway and Michael C Mozer. 2018. Learning deep disentangled embeddings with the f-statistic loss. Advances in neural information processing systems 31 (2018).
[60]
Monika Roopak, Gui Yun Tian, and Jonathon Chambers. 2019. Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE, 0452--0457.
[61]
Emanuele Rossi, Ben Chamberlain, Fabrizio Frasca, Davide Eynard, Federico Monti, and Michael Bronstein. 2020. Temporal graph networks for deep learning on dynamic graphs. arXiv preprint arXiv:2006.10637 (2020).
[62]
Rafath Samrin and D Vasumathi. 2017. Review on anomaly based network intrusion detection system. In 2017 international conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT). IEEE, 141--147.
[63]
Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, and Marius Portmann. 2021. Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings 10. Springer, 117--135.
[64]
Mohanad Sarhan, Siamak Layeghy, and Marius Portmann. 2021. An explainable machine learning-based network intrusion detection system for enabling generalisability in securing IoT networks. arXiv preprint arXiv:2104.07183 (2021).
[65]
Mohanad Sarhan, Siamak Layeghy, and Marius Portmann. 2022. Evaluating standard feature sets towards increased generalisability and explainability of ML-based network intrusion detection. Big Data Research 30 (2022), 100359.
[66]
Mohanad Sarhan, Siamak Layeghy, and Marius Portmann. 2022. Towards a standard feature set for network intrusion detection system datasets. Mobile networks and applications (2022), 1--14.
[67]
Robert E Schapire. 2013. Explaining adaboost. Empirical Inference: Festschrift in Honor of Vladimir N. Vapnik (2013), 37--52.
[68]
Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018), 108--116.
[69]
Vipul Sharma and Roohie Naaz Mir. 2020. A comprehensive and systematic look up into deep learning based object detection techniques: A review. Computer Science Review 38 (2020), 100301.
[70]
Chao Song, Youfang Lin, Shengnan Guo, and Huaiyu Wan. 2020. Spatial-temporal synchronous graph convolutional networks: A new framework for spatial-temporal network data forecasting. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 914--921.
[71]
Raphael Suter, Djordje Miladinovic, Bernhard Schölkopf, and Stefan Bauer. 2019. Robustly disentangled causal mechanisms: Validating deep representations for interventional robustness. In International Conference on Machine Learning. PMLR, 6056--6065.
[72]
Frederik Träuble, Elliot Creager, Niki Kilbertus, Francesco Locatello, Andrea Dittadi, Anirudh Goyal, Bernhard Schölkopf, and Stefan Bauer. 2021. On disentangled representations learned from correlated data. In International Conference on Machine Learning. PMLR, 10401--10412.
[73]
Nguyen Thanh Van, Tran Ngoc Thinh, et al. 2017. An anomaly-based network intrusion detection system using deep learning. In 2017 international conference on system science and engineering (ICSSE). IEEE, 210--214.
[74]
Petar Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017).
[75]
H Wang, ZeZXeZBePJ Lei, X Zhang, B Zhou, and J Peng. 2016. Machine learning basics. Deep learning (2016), 98--164.
[76]
Candid Wueest. 2014. Targeted attacks against the energy sector. Symantec Security Response, Mountain View, CA (2014).
[77]
Da Xu, Chuanwei Ruan, Evren Korpeoglu, Sushant Kumar, and Kannan Achan. 2020. Inductive representation learning on temporal graphs. arXiv preprint arXiv:2002.07962 (2020).
[78]
M. Yoon, B. Hooi, K. Shin, and C. Faloutsos. 2019. Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach. ACM (2019).
[79]
Hengli Zhao, Ning Zheng, Jian Li, Jingjing Yao, and Qiang Hou. 2009. Unknown malware detection based on the full virtualization and svm. In 2009 International Conference on Management of e-Commerce and e-Government. IEEE, 473--476.
[80]
Shijie Zhou, Zhimeng Guo, Charu Aggarwal, Xiang Zhang, and Suhang Wang. 2022. Link Prediction on Heterophilic Graphs via Disentangled Representation Learning. arXiv preprint arXiv:2208.01820 (2022)

Cited By

View all
  • (2025)ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation CorrectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351582120(677-692)Online publication date: 2025
  • (2025)A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language modelsInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02516-6Online publication date: 4-Feb-2025
  • (2024)Refining latent homophilic structures over heterophilic graphs for robust graph convolution networksProceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v38i8.28741(8930-8938)Online publication date: 20-Feb-2024
  • Show More Cited By

Index Terms

  1. 3D-IDS: Doubly Disentangled Dynamic Intrusion Detection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
    August 2023
    5996 pages
    ISBN:9798400701030
    DOI:10.1145/3580305
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 August 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anomaly detection
    2. intrusion detection
    3. network security

    Qualifiers

    • Research-article

    Funding Sources

    • National Key R&D Program of China

    Conference

    KDD '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Upcoming Conference

    KDD '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)307
    • Downloads (Last 6 weeks)31
    Reflects downloads up to 03 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation CorrectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351582120(677-692)Online publication date: 2025
    • (2025)A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language modelsInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02516-6Online publication date: 4-Feb-2025
    • (2024)Refining latent homophilic structures over heterophilic graphs for robust graph convolution networksProceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v38i8.28741(8930-8938)Online publication date: 20-Feb-2024
    • (2024)ReCDA: Concept Drift Adaptation with Representation Enhancement for Network Intrusion DetectionProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3672007(3818-3828)Online publication date: 25-Aug-2024
    • (2024)Channel-Centric Spatio-Temporal Graph Networks for Network-based Intrusion Detection2024 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS62487.2024.10735668(1-9)Online publication date: 30-Sep-2024
    • (2023)How ground-truth label helps link prediction in heterogeneous graphsProceedings of the 2023 2nd International Conference on Algorithms, Data Mining, and Information Technology10.1145/3625403.3625406(6-12)Online publication date: 15-Sep-2023

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media