ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2103.16329
74
205
v1v2v3v4v5v6v7v8 (latest)

E-GraphSAGE: A Graph Neural Network based Intrusion Detection System

30 March 2021
Wai Weng Lo
S. Layeghy
Mohanad Sarhan
M. Gallagher
Marius Portmann
ArXiv (abs)PDFHTML
Abstract

This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation data for NIDSs are typically represented as flow records, which can naturally be represented in a graph format. This establishes the potential and motivation for exploring GNNs for network intrusion detection, which is the focus of this paper. Current approaches to graph representation learning can only consider topological information and/or node features, but not edge features. This is a key limitation for the use of current GNN models for network intrusion detection, since critical flow information for the detection of anomalous or malicious traffic, e.g. flow size, flow duration, etc., is represented as edge features in a graph representation. In this paper, we propose E-GraphSAGE, a first GNN approach which overcomes this limitation and which allows capturing the edge features of a graph, in addition to node features and topological information. We present a novel NIDS based on E-GraphSAGE, and our extensive experimental evaluation on six recent NIDS benchmark datasets shows that it outperforms the state-of-the-art in regards to key classification metrics in four out of six cases, and closely matches it in the other two cases. Our research and initial basic system demonstrates the potential of GNNs for network intrusion detection, and provides motivation for further research.

View on arXiv
Comments on this paper