Graph-Based Machine Learning Techniques for Scalable Network Analysis and Anomaly Detection in Dynamic Cybersecurity Frameworks
Keywords:
Graph-based Machine Learning, Cybersecurity, Anomaly Detection, Network Analysis, Graph Neural Networks, Scalable Security SystemsAbstract
The increasing complexity of cyber threats necessitates the development of scalable, efficient, and robust cybersecurity frameworks. Graph-based machine learning (GBML) techniques have emerged as powerful tools for network analysis and anomaly detection, leveraging graph structures to model intricate relationships between network entities. This paper explores the role of GBML in scalable network analysis, reviews existing methodologies before 2023, and discusses their effectiveness in dynamic cybersecurity frameworks. We also present experimental results demonstrating the efficacy of these methods in real-world cybersecurity scenarios, supplemented with comparative analyses and performance metrics.
References
Ahmed, Z., et al. “Graph-Based Anomaly Detection in Cybersecurity.” IEEE Transactions on Network Security, 2022.
Bellinger, J., and Kumar, R. “Intrusion Detection Using Graph Convolutional Networks.” Cybersecurity Research Journal, 2021.
Cheng, H., et al. “Scalable Network Analysis with GNNs.” Machine Learning & Security, 2020.
Dong, Y., et al. “Graph-Based Deep Learning for Cyber Threats.” CyberAI Journal, 2019.
Fan, H., et al. “Real-Time Network Analysis Using GNNs.” IEEE Transactions on Cybersecurity, 2022.
Gao, J., et al. “Anomaly Detection in IoT Networks Using Graph AI.” Computational Intelligence Journal, 2020.
He, X., et al. “Graph-Based Intrusion Detection: Challenges and Opportunities.” Journal of Machine Learning in Cybersecurity, 2021.
Jiang, Y., et al. “Graph Theory in Cybersecurity: A Review.” Cybersecurity & AI, 2018.
Kim, H., et al. “Using Graph Neural Networks for Scalable Security.” AI & CyberDefense Journal, 2021.
Li, Z., et al. “Graph-Based Malware Detection.” Machine Learning in Security, 2019.
Lin, J., et al. “Efficient Graph Representation for Network Security.” IEEE Cybersecurity Transactions, 2020.
Liu, H., et al. “Machine Learning for Cyber Threat Analysis.” AI in Cybersecurity, 2019.
Patel, A., et al. “Graph Autoencoders for Cybersecurity.” Neural Networks & Cyber Defense, 2020.
Qian, T., et al. “Graph-Based Deep Learning in Cybersecurity.” Security & AI, 2021.
Shen, Y., et al. “Adversarial Machine Learning in Graph-Based Security.” Cyber Threat Intelligence Journal, 2022.
Wang, X., et al. “Scaling Graph-Based Machine Learning for Network Security.” IEEE Security & Privacy, 2019.
Wu, S., et al. “Graph Data Mining for Cybersecurity Applications.” Cyber AI Journal, 2018.
Xu, L., et al. “Large-Scale Graph Learning in Cybersecurity.” Cybersecurity Science Journal, 2020.
Yang, F., et al. “Deep Learning for Graph-Based Intrusion Detection.” Journal of Cybersecurity & AI, 2019.
Zhao, X., et al. “Cyber Threat Detection Using GNNs.” Cybersecurity Research Letters, 2022.