Network Traffic Intrusion Detection Strategy Based on E-GraphSAGE and LSTM.
Haizhou BaoMinhao ChenYiming HuoGuorong YuLei NiePeng LiYuxuan WangPublished in: ICIC (9) (2024)
Keyphrases
- network traffic
- intrusion detection
- intrusion detection system
- anomaly detection
- network security
- detecting anomalous
- computer networks
- network traffic data
- network intrusion detection
- network intrusion
- traffic data
- network monitoring
- network intrusions
- network management
- data mining
- data mining techniques
- information security
- traffic patterns
- network attacks
- maximum likelihood
- feature space
- normal traffic
- real world