JOURNAL ARTICLE

Graph-Structured Network Traffic Modelling for Anomaly-Based Intrusion Detection

Abstract

The increasing complexity of cyber threats demands more advanced network intrusion detection systems (NIDS) capable of identifying both known and emerging attack patterns. In this study, we propose a graph-based anomaly detection approach for network intrusion detection, where network traffic is modeled as graph structures capturing both attribute and topological information. Five graph anomaly detection models—DOMINANT, OCGNN, AnomalyDAE, GAE, and CONAD—are implemented and evaluated on the UNSW-NB15 dataset. The constructed graphs use info_message attributes as nodes, with edges representing sequential traffic relationships. Experimental results show that the Graph Autoencoder (GAE) and Dual Autoencoder (AnomalyDAE) models outperform other methods, achieving F1-scores of 0.8728 and 0.7939, respectively. These findings demonstrate that reconstruction-based approaches effectively capture complex network behaviors, highlighting the potential of graph-based methods to enhance the robustness and accuracy of modern NIDS. Future work will explore dynamic graph modeling, attention mechanisms, and optimization techniques to further improve detection capabilities.

Keywords:
Anomaly detection Computer science Anomaly (physics) Intrusion detection system Intrusion Graph Data mining Geology Theoretical computer science Physics

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
13
Refs
0.26
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Complex Network Analysis Techniques
Physical Sciences →  Physics and Astronomy →  Statistical and Nonlinear Physics
Network Packet Processing and Optimization
Physical Sciences →  Computer Science →  Hardware and Architecture

Related Documents

JOURNAL ARTICLE

Anomaly Based Novel Intrusion Detection System For Network Traffic Reduction

K. VengatesanAbhishek KumarRadhakrishana NaikDeepak Kumar Verma

Journal:   2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on Year: 2018 Pages: 688-690
JOURNAL ARTICLE

Intrusion detection algorithm of wireless network based on network traffic anomaly analysis

Xiangqian NieJianchun XingQimeng LiXiaoping Fan

Journal:   Egyptian Informatics Journal Year: 2025 Vol: 30 Pages: 100689-100689
© 2026 ScienceGate Book Chapters — All rights reserved.