0% Complete
Home
/
13th International Conference on Computer and Knowledge Engineering
An Analysis of Botnet Detection Using Graph Neural Network
Authors :
Faezeh Alizadeh
1
Mohammad Khansari
2
1- دانشگاه تهران
2- university of tehran
Keywords :
Botnet detection،GNN،Power Law،adversarial behavior
Abstract :
The use of artificial intelligence, especially Graph Neural Network (GNN), in solving cyber security issues brings challenges. We address three challenges of GNN for botnet detection. The first is the explainability problem. The nature signature, from the statistical distribution point of view, is the power-law distribution. The question is that for the cyber security modeling is it true or not and what is the impact of this issue on the GGN-based modeling of cyber security systems. The second is the complexity of computation. Embedding graph has a large amount of information, and its training requires a lot of time. Extracting the smaller number of features from the real environment and considering the context can help reduce the computation. The third is the robustness of the model against the mutation behavior of the attacker. Compared to machine learning methods, GNN can be generalized to address behaviors they have not seen before. GNN considers not only individual entity characteristics, but also the relationships between them. According to the data of the real environment, the detection of the botnet has been done so that the computation has been reduced while maintaining the accuracy.
Papers List
List of archived papers
A Novel Density-Based KNN in Pattern Recognition
Sajad Haghzad Klidbary - Abazar Arabameri
Enhanced Atrial Fibrillation (AF) Detection via Data Augmentation with Diffusion Model
Arash Vashagh - Amirhossein Akhoondkazemi - Sayed Jalal Zahabi - Davood Shafie
Recommending Popular Locations Based on Collected Trajectories
Mohammad Rabbani bidgoli - Saber Ziaei
Mitochondrial Segmentation in Microscopy Images Using UNet-VGG19
Zerek Sediq Hossein - Rojiar Pir Mohammadiani - Saadat Izadi
Intracranial Hemorrhage Classification using CBAM Attention Module and Convolutional Neural Networks
Parnian Rahimi - Marjan Naderan - Amir Jamshidnezhad - Shahram Rafie
Deep Inside Tor: Exploring Website Fingerprinting Attacks on Tor Traffic in Realistic Settings
Amirhossein Khajehpour - Farid Zandi - Navid Malekghaini - Mahdi Hemmatyar - Naeimeh Omidvar - Mahdi Jafari Siavoshani
Leveraging Self-Supervised Models for Automatic Whispered Speech Recognition
Aref Farhadipour - Homa Asadi - Volker Dellwo
Analyzing the Impact of COVID-19 on Economy from the Perspective of User’s Reviews
Fatemeh Salmani - Hamed Vahdat-Nejad - Hamideh Hajiabadi
SASIAF, An Scalable Accelerator For Seismic Imaging on Amazon AWS FPGAs
Mostafa Koraei - S.Omid Fatemi
Deep Learning-Driven Beamforming Optimization for High-Performance 5G Planar Antenna Arrays
Rahman Mohammadi - Seyed Reza Razavi Pour
more
Samin Hamayesh - Version 42.4.1