Research on Virus Propagation Network Intrusion Detection Based on Graph Neural Network
Xianer Ying,
Mengshuang Pan,
Xiner Chen,
Yiyi Zhou,
Jianhua Liu (),
Dazhi Li (),
Binghao Guo and
Zihao Zhu
Additional contact information
Xianer Ying: Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
Mengshuang Pan: Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
Xiner Chen: Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
Yiyi Zhou: College of Letters & Science, University of California, Berkeley, Berkeley, CA 94720, USA
Jianhua Liu: Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
Dazhi Li: College of Information, Mechanical and Electrical Engineering, Shanghai Normal University, Shanghai 200234, China
Binghao Guo: Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
Zihao Zhu: Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
Mathematics, 2024, vol. 12, issue 10, 1-11
Abstract:
The field of network security is highly concerned with intrusion detection, which safeguards the security of computer networks. The invention and application of intrusion detection technology play indispensable roles in network security, and it is crucial to investigate and comprehend this topic. Recently, with the continuous occurrence of intrusion incidents in virus propagation networks, traditional network detection algorithms for virus propagation have encountered limitations and have struggled to detect these incidents effectively and accurately. Therefore, updating the intrusion detection algorithm of the virus-spreading network is imperative. This paper introduces a novel system for virus propagation, whose core is a graph-based neural network. By organically combining two modules—a standardization module and a computation module—this system forms a powerful GNN model. The standardization module uses two methods, while the calculation module uses three methods. Through permutation and combination, we obtain six GNN models with different characteristics. To verify their performance, we conducted experiments on the selected datasets. The experimental results show that the proposed algorithm has excellent capabilities, high accuracy, reasonable complexity, and excellent stability in the intrusion detection of virus-spreading networks, making the network more secure and reliable.
Keywords: virus propagation; intrusion detection; deep learning; graph neural networks (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2024
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
https://www.mdpi.com/2227-7390/12/10/1534/pdf (application/pdf)
https://www.mdpi.com/2227-7390/12/10/1534/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:12:y:2024:i:10:p:1534-:d:1394627
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().