CAPTOR: Cyber Attack Protection via Temporal Online Graph Representation Learning

  • Bishal Lakha
  • , Janet Layne
  • , Edoardo Serra
  • , Francesco Gullo
  • , Sushil Jajodia

Research output: Contribution to journalArticlepeer-review

Abstract

Online intrusion detection systems (IDSs), i.e., tools for detecting live cyberattacks in the form of unauthorized access gained to a (networking) system, play a role of paramount importance in the cybersecurity landscape. Among the plethora of existing IDSs, the ones based on temporal graph anomaly detection (TGAD) process a temporal graph representing entities of interest of the underlying system and time-varying relationships among them, and identify anomalous temporal edges in such a graph as potential intrusions. TGAD-based IDSs are superior to various other existing types of IDS for their peculiarities of high generality and powerfulness in data representation and types of cyberattack identifiable. However, existing TGAD-based IDSs are still far from being suitable for real-world settings, due to their severe limitations in efficiently and effectively handling the underlying temporal graphs, which are typically really big. In this paper, we devise CAPTOR (“Cyber Attack Protection via Temporal Online graph Representation learning”), a novel TGAD-based IDS which addresses the limitations of the state of the art. CAPTOR consists of a careful selection and clever combination of graph representation learning (GRL), TGAD, and temporal aggregation of GRL representations (embeddings). These design choices make CAPTOR achieve the best tradeoff between accuracy and scalability in TGAD-based intrusion detection, as testified by extensive experiments on real cybersecurity datasets. As such, with this work we take a significant step forward towards rendering the important TGAD-based IDS technology actually applicable in real-world cybersecurity scenarios.

Original languageEnglish
JournalIEEE Transactions on Big Data
DOIs
StateAccepted/In press - 2025

Keywords

  • big graph processing
  • cybersecurity
  • large-scale graph representation learning
  • online intrusion detection systems
  • scalable data science
  • temporal graph anomaly detection

Fingerprint

Dive into the research topics of 'CAPTOR: Cyber Attack Protection via Temporal Online Graph Representation Learning'. Together they form a unique fingerprint.

Cite this