0% Complete
Home
/
13th International Conference on Computer and Knowledge Engineering
An Analysis of Botnet Detection Using Graph Neural Network
Authors :
Faezeh Alizadeh
1
Mohammad Khansari
2
1- دانشگاه تهران
2- university of tehran
Keywords :
Botnet detection،GNN،Power Law،adversarial behavior
Abstract :
The use of artificial intelligence, especially Graph Neural Network (GNN), in solving cyber security issues brings challenges. We address three challenges of GNN for botnet detection. The first is the explainability problem. The nature signature, from the statistical distribution point of view, is the power-law distribution. The question is that for the cyber security modeling is it true or not and what is the impact of this issue on the GGN-based modeling of cyber security systems. The second is the complexity of computation. Embedding graph has a large amount of information, and its training requires a lot of time. Extracting the smaller number of features from the real environment and considering the context can help reduce the computation. The third is the robustness of the model against the mutation behavior of the attacker. Compared to machine learning methods, GNN can be generalized to address behaviors they have not seen before. GNN considers not only individual entity characteristics, but also the relationships between them. According to the data of the real environment, the detection of the botnet has been done so that the computation has been reduced while maintaining the accuracy.
Papers List
List of archived papers
A scalable blockchain-based educational network for data storage and assessment
Maryam Fattahi Vanani - Hamidreza Shayegh Borujeni - Ali Nourollah
Pyramid Transformer for Traffic Sign Detection
Omid Nejati manzari - Amin Boudesh - Shahriar B. Shokouhi
IR-LPR: Large Scale of Iranian License Plate Recognition Dataset
Mahdi Rahmani - Melika Sabaghian - Seyyedeh Mahila Moghadami - Mohammad Mohsen Talaie - Mahdi Naghibi - Mohammad Ali Keyvanrad
A Novel Method For Fake News Detection Based on Propagation Tree
Mansour Davoudi - Mohammad Reza Moosavi - Mohammad Hadi Sadreddini
Enhancing Cloud Security with Federated CNN-LSTM: A Novel Approach to Intrusion Detection
Reyhaneh Ilaghi - Raheleh Ilaghi - Fereshteh Rahmani - Seyyed hamid Ghafoori
African Vultures Optimization Algorithm for Optimal Damping Controllers Design in the Electrical Power Grid System
Aliyu Sabo - Theophilus Ebuka Odoh - Samuel Habu - Hossein Shahinzadeh - Farshad Ebrahimi
Density Estimation Helps Adversarial Robustness
Afsaneh Hasanebrahimi - Bahareh Kaviani Baghbaderani - Reshad Hosseini - Ahmad Kalhor
Bridging the Synthetic-to-Real Gap (BSRG): Creating Simulated Datasets for Domain Adaptation to Enhance Vehicle Detection
Behnaz Sadeghigol - Mohammad Ali Keyvanrad
AI-Driven Relocation Tracking in Dynamic Kitchen Environments
Arash Nasr Esfahani - Hamed Hosseini - Mehdi Tale Masouleh - Ahmad Kalhor - Hedieh Sajedi
Islamic Geometric algorithms: A survey
Elham Akbari - Azam Bastanfard
more
Samin Hamayesh - Version 41.7.6