GRAPHSEC – Advancing the Application of AI/ML to Network Security through Graph Neural Networks

Pedro Casas-Hernandez (Author and Speaker), Juan Vanerio, Johanna Ullrich, Mislav Findrik, Pere Barlet-Ros

Research output: Chapter in Book or Conference ProceedingsConference Proceedings with Oral Presentationpeer-review

Abstract

The application of Artificial Intelligence (AI) and Machine Learning (ML) to network security (AI4SEC) is paramount against cybercrime. While AI/ML is today mainstream in domains such as computer vision and speech recognition, it has produced below-par results in AI4SEC. Solutions do not properly generalize, are ineffective in real deployments, and are vulnerable to adversarial attacks. A fundamental limitation is the lack of AI/ML technology specific to network security. Network security data is intrinsically relational, and graph-structured data representations and Graph Neural Networks (GNNs) have the potential to drastically advance the AI4SEC domain. In this positioning paper we propose GRAPHSEC, a research agenda to systematically integrate GNNs in AI4SEC. We structure the state of the art in AI4SEC and on the application of GNNs to network security applications, elaborate on the benefits and challenges faced by GRAPHSEC, and propose a research agenda to advance the AI4SEC domain through GNNs.
Original languageEnglish
Title of host publicationMLN 2022: Machine Learning for Networking.
EditorsÉric Renault, Paul Mühlethaler
Pages56-71
Volume13767
ISBN (Electronic)978-3-031-36183-8
DOIs
Publication statusPublished - 7 Jul 2023
Event5th International Conference on Machine Learning for Networking, MLN 2022 -
Duration: 28 Nov 202230 Nov 2022

Conference

Conference5th International Conference on Machine Learning for Networking, MLN 2022
Period28/11/2230/11/22

Research Field

  • Former Research Field - Data Science

Keywords

  • Network Security
  • AI4SEC
  • Graph Neural Networks

Fingerprint

Dive into the research topics of 'GRAPHSEC – Advancing the Application of AI/ML to Network Security through Graph Neural Networks'. Together they form a unique fingerprint.

Cite this