A survey on graph neural networks for intrusion detection systems: methods, trends and challenges

M Zhong, M Lin, C Zhang, Z Xu - Computers & Security, 2024 - Elsevier
Intrusion detection systems (IDS) play a crucial role in maintaining network security. With the
increasing sophistication of cyber attack methods, traditional detection approaches are …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … communications surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Graph neural networks for intrusion detection: A survey

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …

[PDF][PDF] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.

D Han, Z Wang, W Chen, K Wang, R Yu, S Wang… - NDSS, 2023 - ndss-symposium.org
Concept drift is one of the most frustrating challenges for learning-based security
applications built on the closeworld assumption of identical distribution between training and …

Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction

IJ King, HH Huang - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
Lateral movement is a key stage of system compromise used by advanced persistent
threats. Detecting it is no simple task. When network host logs are abstracted into discrete …

[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications

D Han, Z Wang, W Chen, Y Zhong, S Wang… - Proceedings of the …, 2021 - dl.acm.org
Unsupervised Deep Learning (DL) techniques have been widely used in various security-
related anomaly detection applications, owing to the great promise of being able to detect …

Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning

S Wang, Z Wang, T Zhou, H Sun, X Yin… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Host-based threats such as Program Attack, Malware Implantation, and Advanced Persistent
Threats (APT), are commonly adopted by modern attackers. Recent studies propose …

Sok: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

A survey on malware detection with graph representation learning

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024 - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …