Use of Graph Neural Networks in Aiding Defensive Cyber Operations (2401.05680v1)
Abstract: In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information. Additionally, cyber-attacks differ depending on the objective and evolve rapidly to disguise defensive systems. However, a typical cyber-attack demonstrates a series of stages from attack initiation to final resolution, called an attack life cycle. These diverse characteristics and the relentless evolution of cyber attacks have led cyber defense to adopt modern approaches like Machine Learning to bolster defensive measures and break the attack life cycle. Among the adopted ML approaches, Graph Neural Networks have emerged as a promising approach for enhancing the effectiveness of defensive measures due to their ability to process and learn from heterogeneous cyber threat data. In this paper, we look into the application of GNNs in aiding to break each stage of one of the most renowned attack life cycles, the Lockheed Martin Cyber Kill Chain. We address each phase of CKC and discuss how GNNs contribute to preparing and preventing an attack from a defensive standpoint. Furthermore, We also discuss open research areas and further improvement scopes.
- [Online] Cisco. What is cybersecurity? https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html, 2022.
- [Online] Gartner. What is cybersecurity? https://www.gartner.com/en/topics/cybersecurity, 2022.
- The graph neural network model. IEEE transactions on neural networks, 20(1):61–80, 2008.
- Lockheed Martin. Cyber kill chain. https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html, 2011.
- Social bots and their coordination during online campaigns: A survey. IEEE Transactions on Computational Social Systems, 9(2):530–545, 2022.
- Structured citation trend prediction using graph neural networks. In ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, may 2020.
- Protein interface prediction using graph convolutional networks. In I. Guyon, U. Von Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett, editors, Advances in Neural Information Processing Systems, volume 30. Curran Associates, Inc., 2017.
- Betweenness centrality correlation in social networks. Physical Review E, 67(1):017101, 2003.
- Spectral clustering with graph neural networks for graph pooling. In International conference on machine learning, pages 874–883. PMLR, 2020.
- Emmanuel Müller. Graph clustering with graph neural networks. Journal of Machine Learning Research, 24:1–21, 2023.
- Sssnet: semi-supervised signed network clustering. In Proceedings of the 2022 SIAM International Conference on Data Mining (SDM), pages 244–252. SIAM, 2022.
- Self-supervised learning on graphs: Contrastive, generative, or predictive. IEEE Transactions on Knowledge and Data Engineering, 2021.
- Generative graph neural networks for link prediction. arXiv preprint arXiv:2301.00169, 2022.
- Permutation invariant graph generation via score-based generative modeling. In International Conference on Artificial Intelligence and Statistics, pages 4474–4484. PMLR, 2020.
- How powerful are graph neural networks? In International Conference on Learning Representations, 2019.
- Ryoma Sato. A survey on the expressive power of graph neural networks, 2020.
- [Online] Flaticon. Accessed:2023-08-30. https://www.flaticon.com/.
- The graph neural network model. IEEE Transactions on Neural Networks, 20(1):61–80, 2009.
- Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907, 2016.
- Inductive representation learning on large graphs. Advances in neural information processing systems, 30, 2017.
- Graph Attention Networks. International Conference on Learning Representations, 2018.
- Gated graph sequence neural networks, 2015.
- NIST. cyberspace operations. https://csrc.nist.gov/glossary/term/cyberspace_operations, 2022.
- [Online] MITRE. Mitre att&ck. https://attack.mitre.org/, 2011.
- The diamond model of intrusion analysis. Technical report, Center For Cyber Intelligence Analysis and Threat Research Hanover Md, 2013.
- [Online] NIST. Nist. https://www.nist.gov/cyberframework/online-learning/five-functions, 2014.
- [Online]. Ibm security x-force cyberattack preparation and execution frameworks. https://www.ibm.com/downloads/cas/A27KQP8R.
- [Online] LogRhythm. The threat lifecycle management framework. http://www.armana.co.uk/Guides/ARMANA-threat-lifecycle-management-whitepaper.pdf, 2016.
- A survey on differentially private machine learning. IEEE computational intelligence magazine, 15(2):49–64, 2020.
- Impacts and risk of generative ai technology on cyber defense. arXiv preprint arXiv:2306.13033, 2023.
- A white-box adversarial attack against a digital twin. arXiv preprint arXiv:2210.14018, 2022.
- Explainable intrusion detection systems (x-ids): A survey of current methods, challenges, and opportunities. IEEE Access, 10:112392–112415, 2022.
- Adversarial privacy-preserving graph embedding against inference attack. IEEE Internet of Things Journal, 8(8):6904–6915, 2020.
- Privacy-preserving representation learning on graphs: A mutual information perspective. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pages 1667–1676, 2021.
- Information obfuscation of graph neural networks. In International conference on machine learning, pages 6600–6610. PMLR, 2021.
- Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925, 2021.
- Towards representation identical privacy-preserving graph neural network via split learning. arXiv preprint arXiv:2107.05917, 2021.
- Learning privacy-preserving graph convolutional network with partially observed sensitive attributes. In Proceedings of the ACM Web Conference 2022, pages 3552–3561, 2022.
- Secgnn: Privacy-preserving graph neural network training and inference as a cloud service. IEEE Transactions on Services Computing, 2023.
- Automating the construction of internet portals with machine learning. Information Retrieval, 3:127–163, 2000.
- Citeseer: An automatic citation indexing system. In Proceedings of the third ACM conference on Digital libraries, pages 89–98, 1998.
- Collective classification in network data. AI magazine, 29(3):93–93, 2008.
- Grouplens: Applying collaborative filtering to usenet news. Communications of the ACM, 40(3):77–87, 1997.
- Representing text for joint embedding of text and knowledge bases. arXiv preprint arXiv:1503.01130, 2015.
- A matrix factorization technique with trust propagation for recommendation in social networks. In Proceedings of the fourth ACM conference on Recommender systems, pages 135–142, 2010.
- Recommender systems with social regularization. In Proceedings of the fourth ACM international conference on Web search and data mining, pages 287–296, 2011.
- The yahoo! music dataset and kdd-cup’11. In Proceedings of KDD Cup 2011, pages 3–18. PMLR, 2012.
- Data analysis in public social networks. In International scientific conference and international workshop present day trends of innovations, 2012.
- Towards a unified framework for fair and stable graph representation learning. In Uncertainty in Artificial Intelligence, pages 2114–2124. PMLR, 2021.
- Adversarial attack on graph structured data. In International conference on machine learning, pages 1115–1124. PMLR, 2018.
- Adversarial attacks on graph neural networks via meta learning. arXiv:1902.08412, 2019.
- Exploratory adversarial attacks on graph neural networks. In IEEE International Conference On Data Mining (ICDM), 2020.
- Adversarial attacks on link prediction algorithms based on graph neural networks. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pages 370–380, 2020.
- Backdoor attacks to graph neural networks. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, pages 15–26, 2021.
- Semantics-preserving reinforcement learning attack against graph neural networks for malware detection. IEEE Transactions on Dependable and Secure Computing, 2022.
- Hierarchical adversarial attacks against graph neural network based iot network intrusion detection system. IEEE Internet of Things Journal, 2021.
- Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system. Journal of systems architecture, 105:101705, 2020.
- Graph neural networks based detection of stealth false data injection attacks in smart grids. IEEE Systems Journal, 16(2):2946–2957, 2021.
- Discriminative embeddings of latent variable models for structured data. In International conference on machine learning, pages 2702–2711. PMLR, 2016.
- The political blogosphere and the 2004 us election: divided they blog. In Proceedings of the 3rd international workshop on Link discovery, pages 36–43, 2005.
- Deep gaussian embedding of graphs: Unsupervised inductive learning via ranking. arXiv preprint arXiv:1707.03815, 2017.
- Mark EJ Newman. Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3):036104, 2006.
- Collective dynamics of ‘small-world’networks. nature, 393(6684):440–442, 1998.
- Robert Ackland et al. Mapping the us political blogosphere: Are conservative bloggers more prominent? In BlogTalk Downunder 2005 Conference, Sydney. BlogTalk Downunder 2005 Conference, Sydney, 2005.
- Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591, 2019.
- Sybilscar: Sybil detection in online social networks via local rule based propagation. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pages 1–9. IEEE, 2017.
- Deep graph kernels. In Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, pages 1365–1374, 2015.
- Ying Tan. Artificial immune system: applications in computer security. John Wiley & Sons, 2016.
- [Online] Virusshare. Accessed:2023-08-30. https://virusshare.com.
- [Online] VirusTotal. Accessed:2023-04-20. https://www.virustotal.com.
- Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity. In Proceedings of the 2019 ACM Symposium on SDN Research, pages 36–48, 2019.
- [Online] IEEE 30-Bus System. Accessed:2023-08-30. https://icseg.iti.illinois.edu/ieee-30-bus-system.
- [Online] IEEE 118-Bus System. Accessed:2023-08-30. https://icseg.iti.illinois.edu/ieee-118-bus-system.
- pandapower—an open-source python tool for convenient modeling, analysis, and optimization of electric power systems. IEEE Transactions on Power Systems, 33(6):6510–6521, 2018.
- [Online] IEEE 14-Bus System. Accessed:2023-08-30. https://icseg.iti.illinois.edu/ieee-14-bus-system.
- [Online] IEEE 300-Bus System. Accessed:2023-08-30. https://icseg.iti.illinois.edu/ieee-300-bus-system.
- Graph neural networks for anomaly detection in industrial internet of things. IEEE Internet of Things Journal, 2021.
- Anomaly detection using graph neural networks. In 2019 international conference on machine learning, big data, cloud and parallel computing (COMITCon), pages 346–350. IEEE, 2019.
- Relevance-aware anomalous users detection in social network via graph neural network. In 2021 International Joint Conference on Neural Networks (IJCNN), 2021.
- An anomaly event detection method based on gnn algorithm for multi-data sources. In Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021.
- Spammer detection using graph-level classification model of graph neural network. In 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), 2021.
- One-class graph neural networks for anomaly detection in attributed networks. Neural computing and applications, 33(18):12073–12085, 2021.
- One-class temporal graph attention neural network for dynamic graph anomaly detection. In 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT), 2021.
- Multi-layer graph neural network-based random anomalous behavior detection. In 2021 International Conference on Digital Society and Intelligent Systems (DSInS), pages 266–270. IEEE, 2021.
- Gnn-based graph anomaly detection with graph anomaly loss. In The Second International Workshop on Deep Learning on Graphs: Methods and Applications, pages 1–7, 2020.
- Graph neural network-based anomaly detection in multivariate time series. In Proceedings of the AAAI Conference on Artificial Intelligence, 2021.
- [Online] Higgs Twitter Dataset. Accessed:2023-08-30. https://snap.stanford.edu/data/higgs-twitter.html.
- [Online] Enron Email Dataset. Accessed:2023-08-30. https://www.cs.cmu.edu/ ./enron.
- [Online] Yelp Dataset. Accessed:2023-08-30. https://www.kaggle.com/datasets/yelp-dataset/yelp-dataset.
- [Online] Micro Blog Dataset. Accessed:2023-08-30. https://dx.doi.org/10.21227/wzfk-w184.
- The network data repository with interactive graph analytics and visualization. In AAAI, 2015.
- Inductive representation learning on temporal graphs. arXiv preprint arXiv:2002.07962, 2020.
- Predicting dynamic embedding trajectory in temporal interaction networks. In Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pages 1269–1278, 2019.
- [Online] OpenFlights Dataset. Accessed:2023-08-30. https://openflights.org.
- [Online] Email-EU core Dataset. Accessed:2023-08-30. https://snap.stanford.edu/data/email-Eu-core.html.
- Edge weight prediction in weighted signed networks. In 2016 IEEE 16th International Conference on Data Mining (ICDM), pages 221–230. IEEE, 2016.
- Meng Jiang. Catching social media advertisers with strategy analysis. In Proceedings of the First International Workshop on Computational Methods for CyberSafety, pages 5–10, 2016.
- Swat: A water treatment testbed for research and training on ics security. In 2016 international workshop on cyber-physical systems for smart water networks (CySWater), pages 31–36. IEEE, 2016.
- Wadi: a water distribution testbed for research in the design of secure cyber physical systems. In Proceedings of the 3rd international workshop on cyber-physical systems for smart water networks, 2017.
- Path sensitive static analysis of web applications for remote code execution vulnerability detection. In 2013 35th International Conference on Software Engineering (ICSE), pages 652–661. IEEE, 2013.
- Alexander Ivanov Sotirov. Automatic vulnerability detection using static source code analysis. PhD thesis, Citeseer, 2005.
- Zhidong Shen and Si Chen. A survey of automatic software vulnerability detection, program repair, and defect prediction techniques. Security and Communication Networks, 2020:1–16, 2020.
- Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access, 10:6605–6621, 2022.
- The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches. Journal of Network and Computer Applications, 179:103009, 2021.
- A hybrid graph neural network approach for detecting php vulnerabilities. In 2022 IEEE Conference on Dependable and Secure Computing (DSC), pages 1–9. IEEE, 2022.
- Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Advances in neural information processing systems, 32, 2019.
- Regvd: Revisiting graph neural networks for vulnerability detection. In Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Companion Proceedings, 2022.
- Combining graph-based learning with automated data collection for code vulnerability detection. IEEE Transactions on Information Forensics and Security, 16:1943–1958, 2021.
- Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection. Information and Software Technology, 136:106576, 2021.
- Deepwukong: Statically detecting software vulnerabilities using deep graph neural network. ACM Trans. Softw. Eng. Methodol., 2021.
- Csgvd: A deep learning approach combining sequence and graph embedding for source code vulnerability detection. Journal of Systems and Software, 2023.
- Predicting vulnerability inducing function versions using node embeddings and graph neural networks. Inf. Softw. Technol., 145(C), may 2022.
- Smart contract vulnerability detection using graph neural networks. In Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI’20, 2021.
- [Online] Devign Dataset. Accessed:2023-08-30. https://sites.google.com/view/devign.
- Leopard: Identifying vulnerable code for vulnerability assessment through program metrics. In 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019.
- Codexglue: A machine learning benchmark dataset for code understanding and generation. arXiv preprint arXiv:2102.04664, 2021.
- [Online] FUNDED Dataset. Accessed:2023-08-30. https://drive.google.com/drive/folders/1WFFV8uGi8oXpzYORyiqRCYyqJGiHSbZL.
- [Online] BGNN4VD Dataset. Accessed:2023-08-30. https://github.com/SicongCao/BGNN4VD.
- [Online] NIST SARD Dataset. Accessed:2023-08-30. https://samate.nist.gov/SARD.
- [Online] Lua Dataset. Accessed:2023-08-30. https://www.lua.org.
- [Online] Redis Dataset. Accessed:2023-08-30. https://redis.io.
- A. Tosun S.E. Sahin, E.M. Ozyedierler. Predicting vulnerability inducing function versions using node embeddings and graph neural networks - wireshark dataset. https://data.mendeley.com/datasets/ymtf9znmfz/1, Jan 2023.
- Combine sliced joint graph with graph neural networks for smart contract vulnerability detection. Journal of Systems and Software, 2023.
- Smart contract vulnerability detection technique: A survey. arXiv preprint arXiv:2209.05872, 2022.
- A survey on smart contract vulnerabilities: Data sources, detection and repair. Information and Software Technology, page 107221, 2023.
- Recent advances in blockchain and artificial intelligence integration: Feasibility analysis, research issues, applications, challenges, and future work. Security and Communication Networks, 2021.
- Graph neural networks for intrusion detection: A survey. IEEE Access, 2023.
- E-graphsage: A graph neural network based intrusion detection system for iot. In NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 2022.
- Graph-based solutions with residuals for intrusion detection: The modified e-graphsage and e-resgat algorithms. arXiv preprint arXiv:2111.13597, 2021.
- Unveiling the potential of graph neural networks for robust intrusion detection. ACM SIGMETRICS Performance Evaluation Review, 49(4):111–117, 2022.
- Using graph representation in host-based intrusion detection. Security and Communication Networks, 2021:1–13, 2021.
- Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning. IEEE Transactions on Information Forensics and Security, 17:3972–3987, 2022.
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100:779–796, 2019.
- Ton_iot telemetry dataset: A new generation dataset of iot and iiot for data-driven intrusion detection systems. IEEE Access, 8:165130–165150, 2020.
- Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications, pages 117–135. Springer, 2020.
- [Online] CIC-Darknet Dataset. Accessed:2023-08-30. https://www.unb.ca/cic/datasets/darknet2020.html.
- [Online] ToN-IoT Dataset. Accessed:2023-08-30. https://research.unsw.edu.au/projects/toniotunsw-nb15-datasets.
- [Online] UNSW-NB15 Dataset. Accessed:2023-08-30. https://research.unsw.edu.au/projects/unsw-nb15-dataset.
- [Online] CSE-CIC-IDS Dataset. Accessed:2023-08-30. https://www.unb.ca/cic/datasets/ids-2018.html.
- Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1:108–116, 2018.
- A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns. IEEE Transactions on Computers, 63(4):807–819, 2013.
- [Online] StreamSpot Dataset. Accessed:2023-08-30. https://github.com/sbustreamspot/sbustreamspot-data.
- [Online] Unicorn SC Dataset. Accessed:2023-08-30. https://github.com/margoseltzer/shellshock-apt.
- [Online] DARPA TC-3;5 SC. Accessed:2023-08-30. https://github.com/darpa-i2o/Transparent-Computing/blob/master/README-E3.md.
- Heterogeneous graph matching networks: Application to unknown malware detection. In 2019 IEEE International Conference on Big Data (Big Data), pages 5401–5408. IEEE, 2019.
- Classifying malware represented as control flow graphs using deep graph convolutional neural network. In 2019 49th annual IEEE/IFIP international conference on dependable systems and networks (DSN), pages 52–63. IEEE, 2019.
- Classifying packed malware represented as control flow graphs using deep graph convolutional neural network. In 2020 International Conference on Computer Engineering and Application (ICCEA), 2020.
- Intelligent malware detection based on graph convolutional network. The Journal of Supercomputing, 78(3):4182–4198, 2022.
- Android malware detection via graph representation learning. Mobile Information Systems, 2021, 2021.
- Nf-gnn: network flow graph neural networks for malware detection and classification. In 33rd International Conference on Scientific and Statistical Database Management, pages 121–132, 2021.
- Graph neural network-based android malware classification with jumping knowledge. arXiv e-prints, pages arXiv–2201, 2022.
- Cross-architecture internet-of-things malware detection based on graph neural network. In 2021 International Joint Conference on Neural Networks (IJCNN), pages 1–7. IEEE, 2021.
- Learning to compare image patches via convolutional neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 4353–4361, 2015.
- Microsoft malware classification challenge. arXiv preprint arXiv:1802.10135, 2018.
- [Online] YAN-CFG offensivecomputing. Accessed:2023-04-20. http://www.offensivecomputing.net.
- Drebin: Effective and explainable detection of android malware in your pocket. In Ndss, volume 14, pages 23–26, 2014.
- Androzoo: Collecting millions of android apps for the research community. In Proceedings of the 13th international conference on mining software repositories, pages 468–471, 2016.
- Toward developing a systematic approach to generate benchmark android malware datasets and classification. In 2018 International Carnahan conference on security technology (ICCST), 2018.
- A large-scale database for graph representation learning. arXiv preprint arXiv:2011.07682, 2020.
- Malware detection based on graph attention networks for intelligent transportation systems. Electronics, 10(20):2534, 2021.
- Gnn-based malicious network entities identification in large-scale network data. In NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, pages 1–4. IEEE, 2022.
- Deepcatra: Learning flow-and graph-based behaviours for android malware detection. IET Information Security, 17(1):118–130, 2023.
- [Online]. Common vulnerabilities and exposures (cve®). https://cve.mitre.org.
- Graph neural networks with continual learning for fake news detection from social media. arXiv preprint arXiv:2007.03316, 2020.
- Propagation-based fake news detection using graph neural networks with transformer. In 2021 IEEE 10th Global Conference on Consumer Electronics (GCCE), pages 19–20. IEEE, 2021.
- Evidence-aware fake news detection with graph neural networks. In Proceedings of the ACM Web Conference 2022, pages 2501–2510, 2022.
- Cybersecurity knowledge graph improvement with graph neural networks. In 2021 IEEE International Conference on Big Data (Big Data), pages 3290–3297. IEEE, 2021.
- Fakenewsnet: A data repository with news content, social context, and spatiotemporal information for studying fake news on social media. Big data, 8(3):171–188, 2020.
- Where the truth lies: Explaining the credibility of emerging claims on the web and social media. In Proceedings of the 26th International Conference on World Wide Web Companion, 2017.
- Fact checking: Task definition and dataset construction. In Proceedings of the ACL 2014 workshop on language technologies and computational social science, pages 18–22, 2014.
- [Online] DeepWukong Dataset. Accessed:2023-08-02. https://github.com/jumormt/DeepWukong.
- Vnt chain website. https://github.com/vntchain/go-vnt., Jan 2018.
- Illuminati: Towards explaining graph neural networks for cybersecurity analysis. In 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), pages 74–89. IEEE, 2022.
- Gnnexplainer: Generating explanations for graph neural networks. Advances in neural information processing systems, 32, 2019.
- Capow: Context-aware ai-assisted proof of work based ddos defense. arXiv preprint arXiv:2301.11767, 2023.
- [Online]. Optimizing graph neural network training performance on intel® xeon. https://www.linkedin.com/pulse/optimizing-graph-neural-network-training-performance-intel-avancha, Feb 2022.
- On explainability of graph neural networks via subgraph explorations. In International conference on machine learning, pages 12241–12252. PMLR, 2021.
- Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Transactions on Knowledge and Data Engineering, 2021.
- Ethergis: a vulnerability detection framework for ethereum smart contracts based on graph learning features. In 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), pages 1742–1749. IEEE, 2022.
- Graph neural network to dilute outliers for refactoring monolith application. In Proceedings of the AAAI Conference on Artificial Intelligence, 2021.
- Learning to map source code to software vulnerability using code-as-a-graph. arXiv preprint arXiv:2006.08614, 2020.
- Improved code summarization via a graph neural network. In Proceedings of the 28th international conference on program comprehension, 2020.
- A code centric evaluation of c/c++ vulnerability datasets for deep learning based vulnerability detection techniques. In Proceedings of the 16th Innovations in Software Engineering Conference, 2023.
- hex rays. Ida pro [online]. https://hex-rays.com/ida-pro/.
- Ghidra. Ghidra [online]. https://ghidra-sre.org/.
- From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms, 10(2):39, 2017.
- Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues. Information Sciences, 239:201–225, 2013.
- Automating botnet detection with graph neural networks. arXiv preprint arXiv:2003.06344, 2020.
- Survey of malware analysis through control flow graph using machine learning. arXiv preprint arXiv:2305.08993, 2023.
- Combating fake cyber threat intelligence using provenance in cybersecurity knowledge graphs. In 2021 IEEE International Conference on Big Data (Big Data), pages 3316–3323. IEEE, 2021.
- Fedgraphnn: A federated learning system and benchmark for graph neural networks. arXiv preprint arXiv:2104.07145, 2021.
- Sgnn: A graph neural network based federated learning approach by hiding structure. In 2019 IEEE International Conference on Big Data (Big Data), pages 2560–2568. IEEE, 2019.
- Adaptive transfer learning on graph neural networks. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pages 565–574, 2021.