Home > Research > Publications & Outputs > Scalable Graph-Aware Edge Representation Learni...

Links

Text available via DOI:

View graph of relations

Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. / Jiang, Zhenyu; Li, Jiliang; Hu, Qinnan et al.
In: IEEE Internet of Things Journal, Vol. 11, No. 16, 15.08.2024, p. 26955-26969.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Jiang, Z, Li, J, Hu, Q, Meng, W, Pedrycz, W & Su, Z 2024, 'Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection', IEEE Internet of Things Journal, vol. 11, no. 16, pp. 26955-26969. https://doi.org/10.1109/JIOT.2024.3397364

APA

Jiang, Z., Li, J., Hu, Q., Meng, W., Pedrycz, W., & Su, Z. (2024). Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. IEEE Internet of Things Journal, 11(16), 26955-26969. https://doi.org/10.1109/JIOT.2024.3397364

Vancouver

Jiang Z, Li J, Hu Q, Meng W, Pedrycz W, Su Z. Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. IEEE Internet of Things Journal. 2024 Aug 15;11(16):26955-26969. Epub 2024 May 7. doi: 10.1109/JIOT.2024.3397364

Author

Jiang, Zhenyu ; Li, Jiliang ; Hu, Qinnan et al. / Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. In: IEEE Internet of Things Journal. 2024 ; Vol. 11, No. 16. pp. 26955-26969.

Bibtex

@article{3768d7c06b2346419d35eec7bd58ebcb,
title = "Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection",
abstract = "Network intrusion detection systems (NIDSs) have emerged as a frontline defense against the potential attacks in the wireless Internet of Things (IoT) networks. However, existing machine learning methods follow an unstructured data processing patterns and can barely incorporate all information due to the network dynamicity as well as the data imbalance. In this study, we propose the graph isomorphism network model based on the edge (GINE), an innovative graph-based algorithm tailored to pinpoint the malicious network traffic within the wireless IoT networks. Specifically, we initiate by presenting the wireless IoT network graph, capturing the global topological interactions of its edges. Subsequently, we design an edge representation learning algorithm, capable of encoding network data frames in a discerning pattern-aware manner. Moreover, we integrate a data interpolation module into the edges of our structured graph data targeting at the data imbalance, which fosters a more balanced distribution across the various classes of edges. Our empirical analysis on the selected wireless IoT intrusion data sets shows GINE{\textquoteright}s superiority, consistently outperforming the state-of-the-art methods in classification metrics, including accuracy, F1-score, false alarm rate, etc. Through a simulated wireless environment, we demonstrate GINE{\textquoteright}s robust scalability, even in unpredictable wireless networks.",
author = "Zhenyu Jiang and Jiliang Li and Qinnan Hu and Weizhi Meng and Witold Pedrycz and Zhou Su",
year = "2024",
month = aug,
day = "15",
doi = "10.1109/JIOT.2024.3397364",
language = "English",
volume = "11",
pages = "26955--26969",
journal = "IEEE Internet of Things Journal",
issn = "2327-4662",
publisher = "IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC",
number = "16",

}

RIS

TY - JOUR

T1 - Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection

AU - Jiang, Zhenyu

AU - Li, Jiliang

AU - Hu, Qinnan

AU - Meng, Weizhi

AU - Pedrycz, Witold

AU - Su, Zhou

PY - 2024/8/15

Y1 - 2024/8/15

N2 - Network intrusion detection systems (NIDSs) have emerged as a frontline defense against the potential attacks in the wireless Internet of Things (IoT) networks. However, existing machine learning methods follow an unstructured data processing patterns and can barely incorporate all information due to the network dynamicity as well as the data imbalance. In this study, we propose the graph isomorphism network model based on the edge (GINE), an innovative graph-based algorithm tailored to pinpoint the malicious network traffic within the wireless IoT networks. Specifically, we initiate by presenting the wireless IoT network graph, capturing the global topological interactions of its edges. Subsequently, we design an edge representation learning algorithm, capable of encoding network data frames in a discerning pattern-aware manner. Moreover, we integrate a data interpolation module into the edges of our structured graph data targeting at the data imbalance, which fosters a more balanced distribution across the various classes of edges. Our empirical analysis on the selected wireless IoT intrusion data sets shows GINE’s superiority, consistently outperforming the state-of-the-art methods in classification metrics, including accuracy, F1-score, false alarm rate, etc. Through a simulated wireless environment, we demonstrate GINE’s robust scalability, even in unpredictable wireless networks.

AB - Network intrusion detection systems (NIDSs) have emerged as a frontline defense against the potential attacks in the wireless Internet of Things (IoT) networks. However, existing machine learning methods follow an unstructured data processing patterns and can barely incorporate all information due to the network dynamicity as well as the data imbalance. In this study, we propose the graph isomorphism network model based on the edge (GINE), an innovative graph-based algorithm tailored to pinpoint the malicious network traffic within the wireless IoT networks. Specifically, we initiate by presenting the wireless IoT network graph, capturing the global topological interactions of its edges. Subsequently, we design an edge representation learning algorithm, capable of encoding network data frames in a discerning pattern-aware manner. Moreover, we integrate a data interpolation module into the edges of our structured graph data targeting at the data imbalance, which fosters a more balanced distribution across the various classes of edges. Our empirical analysis on the selected wireless IoT intrusion data sets shows GINE’s superiority, consistently outperforming the state-of-the-art methods in classification metrics, including accuracy, F1-score, false alarm rate, etc. Through a simulated wireless environment, we demonstrate GINE’s robust scalability, even in unpredictable wireless networks.

U2 - 10.1109/JIOT.2024.3397364

DO - 10.1109/JIOT.2024.3397364

M3 - Journal article

VL - 11

SP - 26955

EP - 26969

JO - IEEE Internet of Things Journal

JF - IEEE Internet of Things Journal

SN - 2327-4662

IS - 16

ER -