Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric
Graph Alignment Approach
- URL: http://arxiv.org/abs/2301.09801v1
- Date: Tue, 24 Jan 2023 03:55:14 GMT
- Title: Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric
Graph Alignment Approach
- Authors: Jiashu Wu, Hao Dai, Yang Wang, Kejiang Ye, Chengzhong Xu
- Abstract summary: Data scarcity hinders the usability of data-dependent algorithms when tackling IoT intrusion detection (IID)
We utilise the data rich network intrusion detection (NID) domain to facilitate more accurate intrusion detection for IID domains.
- Score: 21.7683532972677
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Data scarcity hinders the usability of data-dependent algorithms when
tackling IoT intrusion detection (IID). To address this, we utilise the data
rich network intrusion detection (NID) domain to facilitate more accurate
intrusion detection for IID domains. In this paper, a Geometric Graph Alignment
(GGA) approach is leveraged to mask the geometric heterogeneities between
domains for better intrusion knowledge transfer. Specifically, each intrusion
domain is formulated as a graph where vertices and edges represent intrusion
categories and category-wise interrelationships, respectively. The overall
shape is preserved via a confused discriminator incapable to identify adjacency
matrices between different intrusion domain graphs. A rotation avoidance
mechanism and a centre point matching mechanism is used to avoid graph
misalignment due to rotation and symmetry, respectively. Besides, category-wise
semantic knowledge is transferred to act as vertex-level alignment. To exploit
the target data, a pseudo-label election mechanism that jointly considers
network prediction, geometric property and neighbourhood information is used to
produce fine-grained pseudo-label assignment. Upon aligning the intrusion
graphs geometrically from different granularities, the transferred intrusion
knowledge can boost IID performance. Comprehensive experiments on several
intrusion datasets demonstrate state-of-the-art performance of the GGA approach
and validate the usefulness of GGA constituting components.
Related papers
- Unsupervised Graph Anomaly Detection via Multi-Hypersphere Heterophilic Graph Learning [7.277472116667557]
Graph Anomaly (GAD) plays a vital role in various data mining applications such as e-commerce fraud prevention and malicious user detection.
We propose a Heterophilic Graph Detection (HGE) module to learn distinguishable abnormal representations for potential anomalies.
Then, we propose a Multi-Hypersphere Learning (MHL) module to enhance the detection capability for context-dependent anomalies.
arXiv Detail & Related papers (2025-03-15T08:08:13Z) - A Label-Free Heterophily-Guided Approach for Unsupervised Graph Fraud Detection [60.09453163562244]
We propose a Heterophily-guided Unsupervised Graph fraud dEtection approach (HUGE) for unsupervised GFD.
In the estimation module, we design a novel label-free heterophily metric called HALO, which captures the critical graph properties for GFD.
In the alignment-based fraud detection module, we develop a joint-GNN architecture with ranking loss and asymmetric alignment loss.
arXiv Detail & Related papers (2025-02-18T22:07:36Z) - HGAttack: Transferable Heterogeneous Graph Adversarial Attack [63.35560741500611]
Heterogeneous Graph Neural Networks (HGNNs) are increasingly recognized for their performance in areas like the web and e-commerce.
This paper introduces HGAttack, the first dedicated gray box evasion attack method for heterogeneous graphs.
arXiv Detail & Related papers (2024-01-18T12:47:13Z) - Effective In-vehicle Intrusion Detection via Multi-view Statistical
Graph Learning on CAN Messages [9.04771951523525]
In-vehicle network (IVN) is facing a wide variety of complex and changing external cyber-attacks.
Only coarse-grained recognition can be achieved in current mainstream intrusion detection mechanisms.
We propose StatGraph: an Effective Multi-view Statistical Graph Learning Intrusion Detection.
arXiv Detail & Related papers (2023-11-13T03:49:55Z) - Network Intrusion Detection with Edge-Directed Graph Multi-Head Attention Networks [13.446986347747325]
This paper proposes novel Edge-Directed Graph Multi-Head Attention Networks (EDGMAT) for network intrusion detection.
The proposed EDGMAT model introduces a multi-head attention mechanism into the intrusion detection model. Additional weight learning is realized through the combination of a multi-head attention mechanism and edge features.
arXiv Detail & Related papers (2023-10-26T12:30:11Z) - BOURNE: Bootstrapped Self-supervised Learning Framework for Unified
Graph Anomaly Detection [50.26074811655596]
We propose a novel unified graph anomaly detection framework based on bootstrapped self-supervised learning (named BOURNE)
By swapping the context embeddings between nodes and edges, we enable the mutual detection of node and edge anomalies.
BOURNE can eliminate the need for negative sampling, thereby enhancing its efficiency in handling large graphs.
arXiv Detail & Related papers (2023-07-28T00:44:57Z) - Adaptive Face Recognition Using Adversarial Information Network [57.29464116557734]
Face recognition models often degenerate when training data are different from testing data.
We propose a novel adversarial information network (AIN) to address it.
arXiv Detail & Related papers (2023-05-23T02:14:11Z) - Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive
Alignment [22.769474986808113]
Cross-domain graph anomaly detection (CD-GAD) describes the problem of detecting anomalous nodes in an unlabelled target graph.
We introduce a novel domain adaptation approach, namely Anomaly-aware Contrastive alignmenT (ACT) for GAD.
ACT achieves substantially improved detection performance over 10 state-of-the-art GAD methods.
arXiv Detail & Related papers (2022-12-02T11:21:48Z) - The Devil is in the Conflict: Disentangled Information Graph Neural
Networks for Fraud Detection [17.254383007779616]
We argue that the performance degradation is mainly attributed to the inconsistency between topology and attribute.
We propose a simple and effective method that uses the attention mechanism to adaptively fuse two views.
Our model can significantly outperform stateof-the-art baselines on real-world fraud detection datasets.
arXiv Detail & Related papers (2022-10-22T08:21:49Z) - Information Obfuscation of Graph Neural Networks [96.8421624921384]
We study the problem of protecting sensitive attributes by information obfuscation when learning with graph structured data.
We propose a framework to locally filter out pre-determined sensitive attributes via adversarial training with the total variation and the Wasserstein distance.
arXiv Detail & Related papers (2020-09-28T17:55:04Z) - Simultaneous Semantic Alignment Network for Heterogeneous Domain
Adaptation [67.37606333193357]
We propose aSimultaneous Semantic Alignment Network (SSAN) to simultaneously exploit correlations among categories and align the centroids for each category across domains.
By leveraging target pseudo-labels, a robust triplet-centroid alignment mechanism is explicitly applied to align feature representations for each category.
Experiments on various HDA tasks across text-to-image, image-to-image and text-to-text successfully validate the superiority of our SSAN against state-of-the-art HDA methods.
arXiv Detail & Related papers (2020-08-04T16:20:37Z) - Graph Representation Learning via Graphical Mutual Information
Maximization [86.32278001019854]
We propose a novel concept, Graphical Mutual Information (GMI), to measure the correlation between input graphs and high-level hidden representations.
We develop an unsupervised learning model trained by maximizing GMI between the input and output of a graph neural encoder.
arXiv Detail & Related papers (2020-02-04T08:33:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.