Please use this identifier to cite or link to this item: http://localhost:8081/jspui/handle/123456789/18546
Title: NETWORK INTRUSION DETECTION SYSTEM USING AUTO-ENCODER AND GRAPH NEURAL NETWORK
Authors: Islavath, Yoginath
Issue Date: Jun-2024
Publisher: IIT, Roorkee
Abstract: A Network Intrusion Detection System (NIDS) is very important for keeping information safe by helping system administrators spot and identify harmful activities in networks. Numerous methods have been developed to detect anomalies reliably, but finding network anomalies accurately is still tough. To tackle problem, we suggest using a autoencoder (AE) with a Dropout model and Graph Neural Networks (GNNs) for detecting network anomalies. This method helps in extracting key features, which boosts detection accuracy. We train and test our method using the well-known NF-CSE-CIC-IDS2018, UNR-IDD, NSL-KDD, and NF-Bot-IoT datasets. Graph Neural Networks have become very popular for Network Intrusion Detection Systems (NIDS) because they are good at representing network traffic flows. Current self-learning methods using Graph Neural Networks can only classify network traffic as normal or abnormal, but cannot pinpoint the exact type of cyber attack. First, we create a component that converts graph data into learned representations, using an attention technique that focuses on the important connections between nodes. Then, we introduce a new self-learning method that trains the system by comparing and contrasting different graph examples. This approach selects central nodes, and creates subgraphs containing those nodes along with their directly connected neighbors. It also generates comparable contrasting subgraphs by modifying and interpolating the original graph data. Positive and negative samples are then constructed from these subgraphs. We also developed a new way to calculate the learning error that considers both the characteristics of the network connections as well as the local structure of the graph data. We tested our approach by measuring its performance using metrics like accuracy, recall, precision, F-score, and detection rate across different types of cyber attacks.
URI: http://localhost:8081/jspui/handle/123456789/18546
Research Supervisor/ Guide: Gangopadhyay, Sugata
metadata.dc.type: Dissertations
Appears in Collections:MASTERS' THESES (CSE)

Files in This Item:
File Description SizeFormat 
22535014_ISLAVATH YOGINATH.pdf982.56 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.