Skip to main content

Showing 1–8 of 8 results for author: Lo, W W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.14746  [pdf, other

    cs.CR cs.AI cs.CL cs.NE cs.NI

    FlowTransformer: A Transformer Framework for Flow-based Network Intrusion Detection Systems

    Authors: Liam Daly Manocchio, Siamak Layeghy, Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Marius Portmann

    Abstract: This paper presents the FlowTransformer framework, a novel approach for implementing transformer-based Network Intrusion Detection Systems (NIDSs). FlowTransformer leverages the strengths of transformer models in identifying the long-term behaviour and characteristics of networks, which are often overlooked by most existing NIDSs. By capturing these complex patterns in network traffic, FlowTransfo… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  2. arXiv:2212.07558  [pdf, other

    cs.CR cs.LG cs.NI

    DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection

    Authors: Mohanad Sarhan, Gayan Kulatilleke, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: Machine Learning (ML) approaches have been used to enhance the detection capabilities of Network Intrusion Detection Systems (NIDSs). Recent work has achieved near-perfect performance by following binary- and multi-class network anomaly detection tasks. Such systems depend on the availability of both (benign and malicious) network data classes during the training phase. However, attack data sample… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  3. arXiv:2207.09088  [pdf, other

    cs.CR cs.LG cs.NI

    XG-BoT: An Explainable Deep Graph Neural Network for Botnet Detection and Forensics

    Authors: Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: In this paper, we propose XG-BoT, an explainable deep graph neural network model for botnet node detection. The proposed model comprises a botnet detector and an explainer for automatic forensics. The XG-BoT detector can effectively detect malicious botnet nodes in large-scale networks. Specifically, it utilizes a grouped reversible residual connection with a graph isomorphism network to learn exp… ▽ More

    Submitted 11 March, 2023; v1 submitted 19 July, 2022; originally announced July 2022.

    Comments: Accepted by Internet of Things, Elsevier

  4. arXiv:2207.06819  [pdf, other

    cs.LG cs.AI cs.CR cs.NI

    Anomal-E: A Self-Supervised Network Intrusion Detection System based on Graph Neural Networks

    Authors: Evan Caville, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusion and anomaly detection. GNNs are a deep learning approach for graph-based data that incorporate graph structures into learning to generalise graph representations and output embeddings. As network flows are naturally graph-based, GNNs are a suitable fit for analysing and learning network behaviour… ▽ More

    Submitted 9 February, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

    Comments: Accepted by Knowledge-Based Systems

  5. arXiv:2204.04254  [pdf, other

    cs.CR cs.LG cs.NI

    HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection

    Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: The continuous strengthening of the security posture of IoT ecosystems is vital due to the increasing number of interconnected devices and the volume of sensitive data shared. The utilisation of Machine Learning (ML) capabilities in the defence against IoT cyber attacks has many potential benefits. However, the currently proposed frameworks do not consider data privacy, secure architectures, and/o… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  6. arXiv:2203.10465  [pdf, other

    cs.CR cs.LG q-fin.ST

    Inspection-L: Self-Supervised GNN Node Embeddings for Money Laundering Detection in Bitcoin

    Authors: Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Criminals have become increasingly experienced in using cryptocurrencies, such as Bitcoin, for money laundering. The use of cryptocurrencies can hide criminal identities and transfer hundreds of millions of dollars of dirty funds through their criminal digital wallets. However, this is considered a paradox because cryptocurrencies are goldmines for open-source intelligence, giving law enforcement… ▽ More

    Submitted 9 October, 2022; v1 submitted 20 March, 2022; originally announced March 2022.

  7. arXiv:2201.07537  [pdf, other

    cs.CR cs.LG

    Graph Neural Network-based Android Malware Classification with Jum** Knowledge

    Authors: Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann

    Abstract: This paper presents a new Android malware detection method based on Graph Neural Networks (GNNs) with Jum**-Knowledge (JK). Android function call graphs (FCGs) consist of a set of program functions and their inter-procedural calls. Thus, this paper proposes a GNN-based method for Android malware detection by capturing meaningful intra-procedural call path patterns. In addition, a Jum**-Knowled… ▽ More

    Submitted 13 June, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

    Comments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022

  8. arXiv:2103.16329  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT

    Authors: Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann

    Abstract: This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation data for NIDSs are typically represented as flow records, which can naturally be represented in a graph format. In this paper, we propose E-Graph… ▽ More

    Submitted 10 January, 2022; v1 submitted 30 March, 2021; originally announced March 2021.

    Comments: will appear in IEEE/IFIP Network Operations and Management Symposium 2022