Graph Neural Networks for Real-Time Cyber Threat Intelligence in LargeScale Networks

Authors

  • Alice Willie, Albert Liam Department of Computer Science, Oregon State University Author

Keywords:

Graph Neural Networks (GNNs), Cyber Threat Intelligence (CTI), Large-Scale Networks, Anomaly Detection, Zero-Day Attack Detection, Advanced Persistent Threats (APTs), Temporal Graph Networks, Network Security, Deep Learning for Cybersecurity, Real-Time Threat Detection

Abstract

The increasing complexity and scale of modern network infrastructures have made realtime cyber threat intelligence (CTI) a crucial requirement for ensuring security and resilience. Traditional machine learning approaches struggle with capturing intricate relationships between network entities, limiting their effectiveness in detecting advanced cyber threats. Graph Neural Networks (GNNs) offer a powerful solution by leveraging graph-based representations to model complex network structures and interactions, enabling more accurate anomaly detection and predictive threat analysis. This study presents a GNN-based framework for real-time cyber threat intelligence in large-scale networks, focusing on detecting zero-day attacks, advanced persistent threats (APTs), and lateral movement patterns. The proposed model integrates heterogeneous graph embeddings, attention mechanisms, and temporal graph networks to enhance threat detection capabilities. Extensive experiments using real-world cybersecurity datasets, including UNSW-NB15 and CIC-IDS2018, demonstrate that our approach achieves higher detection accuracy, lower false positive rates, and improved scalability compared to conventional deep learning models. The results highlight the effectiveness of GNNs in capturing complex threat propagation patterns, making them a promising tool for proactive cybersecurity strategies in large-scale networks.

Downloads

Download data is not yet available.

Downloads

Published

2012-09-16

How to Cite

Graph Neural Networks for Real-Time Cyber Threat Intelligence in LargeScale Networks. (2012). International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 3(1), 8-19. https://ijmlrcai.com/index.php/Journal/article/view/352

Similar Articles

1-10 of 251

You may also start an advanced similarity search for this article.