{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:33:10Z","timestamp":1763202790268,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031427947"},{"type":"electronic","value":"9783031427954"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42795-4_12","type":"book-chapter","created":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T08:03:07Z","timestamp":1692777787000},"page":"127-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Abnormal Communication Patterns in\u00a0IoT Networks Using Graph Neural Networks"],"prefix":"10.1007","author":[{"given":"Vincenzo","family":"Carletti","sequence":"first","affiliation":[]},{"given":"Pasquale","family":"Foggia","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Vento","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,24]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Abbasi, M., Shahraki, A., Taherkordi, A.: Deep learning for network traffic monitoring and analysis (NTMA): a survey. Comput. Commun. 170, 19\u201341 (2021). https:\/\/doi.org\/10.1016\/j.comcom.2021.01.021","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"12_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108719","volume":"204","author":"Z Aouini","year":"2022","unstructured":"Aouini, Z., Pekar, A.: Nfstream: a flexible network data analysis framework. Comput. Netw. 204, 108719 (2022)","journal-title":"Comput. Netw."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Churcher, A., et al.: An experimental analysis of attack classification using machine learning in IOT networks. Sensors 21(2), 446 (2021)","DOI":"10.3390\/s21020446"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Deng, A., Hooi, B.: Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 4027\u20134035 (2021)","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection on attributed networks. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp. 594\u2013602. SIAM (2019)","DOI":"10.1137\/1.9781611975673.67"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"81664","DOI":"10.1109\/ACCESS.2019.2921912","volume":"7","author":"M Fahim","year":"2019","unstructured":"Fahim, M., Sillitti, A.: Anomaly detection, analysis and prediction techniques in IOT environment: a systematic literature review. IEEE Access 7, 81664\u201381681 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2921912","journal-title":"IEEE Access"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Iliofotou, M., Pappu, P., Faloutsos, M., Mitzenmacher, M., Singh, S., Varghese, G.: Network monitoring using traffic dispersion graphs (TDGs). In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 315\u2013320 (2007)","DOI":"10.1145\/1298306.1298349"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: bot-IOT dataset. Future Gen. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Future Gen. Comput. Syst."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M., Portmann, M.: E-graphsage: a graph neural network based intrusion detection system for IOT. In: NOMS 2022\u20132022 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20139. IEEE (2022)","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"12_CR10","doi-asserted-by":"publisher","unstructured":"Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999\u20132012 (2019). https:\/\/doi.org\/10.1007\/s00500-019-04030-2","DOI":"10.1007\/s00500-019-04030-2"},{"key":"12_CR11","unstructured":"Ma, X., et al.:: A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data Eng. (2021)"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Macas, M., Wu, C., Fuertes, W.: A survey on deep learning for cybersecurity: progress, challenges, and opportunities. Comput. Netw. 212, 109032 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109032","DOI":"10.1016\/j.comnet.2022.109032"},{"issue":"2","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1109\/COMST.2018.2883147","volume":"21","author":"F Pacheco","year":"2019","unstructured":"Pacheco, F., Exposito, E., Gineste, M., Baudoin, C., Aguilar, J.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun. Surv. Tutor. 21(2), 1988\u20132014 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2883147","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"12_CR14","volume-title":"A Labeled Dataset with Malicious and Benign IOT Network Traffic","author":"A Parmisano","year":"2020","unstructured":"Parmisano, A., Garcia, S., Erquiaga, M.J.: A Labeled Dataset with Malicious and Benign IOT Network Traffic. Stratosphere Laboratory, Praha, Czech Republic (2020)"},{"key":"12_CR15","unstructured":"The Guardian: DDoS attack that disrupted internet was largest of its kind in history, experts say. https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Ullah, I., Mahmoud, Q.H.: A scheme for generating a dataset for anomalous activity detection in IoT networks. In: Goutte, C., Zhu, X. (eds.) Canadian AI 2020. LNCS (LNAI), vol. 12109, pp. 508\u2013520. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-47358-7_52","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"12073","DOI":"10.1007\/s00521-021-05924-9","volume":"33","author":"X Wang","year":"2021","unstructured":"Wang, X., Jin, B., Du, Y., Cui, P., Tan, Y., Yang, Y.: One-class graph neural networks for anomaly detection in attributed networks. Neural Comput. Appl. 33, 12073\u201312085 (2021)","journal-title":"Neural Comput. Appl."},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Xu, Z., Huang, X., Zhao, Y., Dong, Y., Li, J.: Contrastive attributed network anomaly detection with data augmentation. In: Advances in Knowledge Discovery and Data Mining: 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, 16\u201319 May 2022, Proceedings, Part II, pp. 444\u2013457. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05936-0_35","DOI":"10.1007\/978-3-031-05936-0_35"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Zheng, J., Li, D.: Gcn-tc: combining trace graph with statistical features for network traffic classification. In: ICC 2019\u20132019 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761115"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6480172","volume":"2022","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Zeng, Z., Feng, T.: Gcn-eta: high-efficiency encrypted malicious traffic detection. Secur. Commun. Netw. 2022, 1\u201311 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"12_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102632","volume":"115","author":"F Zola","year":"2022","unstructured":"Zola, F., Segurola-Gil, L., Bruse, J.L., Galar, M., Orduna-Urrutia, R.: Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing. Comput. Secur. 115, 102632 (2022)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Graph-Based Representations in Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42795-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:30:25Z","timestamp":1710232225000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42795-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031427947","9783031427954"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42795-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GbRPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Graph-Based Representations in Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietri sul Mare","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gbrpr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/gbr2023.unisa.it","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}