{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T05:56:27Z","timestamp":1773294987846,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031805066","type":"print"},{"value":"9783031805073","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80507-3_5","type":"book-chapter","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T17:07:14Z","timestamp":1738256834000},"page":"41-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing IoT Network Security with\u00a0Graph Neural Networks for\u00a0Node Anomaly Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9130-5533","authenticated-orcid":false,"given":"Vincenzo","family":"Carletti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7096-1902","authenticated-orcid":false,"given":"Pasquale","family":"Foggia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2375-4839","authenticated-orcid":false,"given":"Francesco","family":"Rosa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2948-741X","authenticated-orcid":false,"given":"Mario","family":"Vento","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comcom.2021.01.021","volume":"170","author":"M Abbasi","year":"2021","unstructured":"Abbasi, M., Shahraki, A., Taherkordi, A.: Deep learning for network traffic monitoring and analysis (NTMA): a survey. Comput. Commun. 170, 19\u201341 (2021). https:\/\/doi.org\/10.1016\/j.comcom.2021.01.021","journal-title":"Comput. Commun."},{"key":"5_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108719","volume":"204","author":"Z Aouini","year":"2022","unstructured":"Aouini, Z., Pekar, A.: Nfstream: a flexible network data analysis framework. Comput. Netw. 204, 108719 (2022)","journal-title":"Comput. Netw."},{"key":"5_CR3","unstructured":"Carletti, V., Foggia, P., Rosa, F., Vento, M.: IoT network analysis. https:\/\/mivia.unisa.it\/datasets\/iot-network-analysis\/"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Carletti, V., Foggia, P., Vento, M.: Detecting abnormal communication patterns in IoT networks using graph neural networks. In: International Workshop on Graph-Based Representations in Pattern Recognition, pp. 127\u2013138. Springer (2023)","DOI":"10.1007\/978-3-031-42795-4_12"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Carletti, V., Saggese, A., Foggia, P., Greco, A., Vento, M.: Machine learning methodologies for preventing malware obfuscation, pp. 99\u2013116. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-21940-5_6","DOI":"10.1007\/978-3-031-21940-5_6"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Deng, A., Hooi, B.: Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035, pp. 4027\u20134035 (2021)","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection on attributed networks. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp. 594\u2013602. SIAM (2019)","DOI":"10.1137\/1.9781611975673.67"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Fix, E., Hodges, J.L.: Discriminatory analysis. nonparametric discrimination: consistency properties. Int. Stat. Rev.\/Revue Internationale de Statistique 57(3), 238\u2013247 (1989)","DOI":"10.2307\/1403797"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"5_CR10","first-page":"857","volume":"35","author":"X Liu","year":"2021","unstructured":"Liu, X., et al.: Self-supervised learning: generative or contrastive. IEEE Trans. Knowl. Data Eng. 35(1), 857\u2013876 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"5_CR11","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TNNLS.2021.3068344","volume":"33","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Li, Z., Pan, S., Gong, C., Zhou, C., Karypis, G.: Anomaly detection on attributed networks via contrastive self-supervised learning. IEEE Trans. Neural Netw. Learn. Syst. 33(6), 2378\u20132392 (2021)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M., Portmann, M.: E-graphsage: a graph neural network based intrusion detection system for IoT. In: 2022 IEEE\/IFIP Network Operations and Management Symposium, NOMS 2022, pp.\u00a01\u20139. IEEE (2022)","DOI":"10.1109\/NOMS54207.2022.9789878"},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2019","unstructured":"Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft. Comput. 24(3), 1999\u20132012 (2019). https:\/\/doi.org\/10.1007\/s00500-019-04030-2","journal-title":"Soft. Comput."},{"key":"5_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109032","volume":"212","author":"M Macas","year":"2022","unstructured":"Macas, M., Wu, C., Fuertes, W.: A survey on deep learning for cybersecurity: progress, challenges, and opportunities. Comput. Netw. 212, 109032 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109032","journal-title":"Comput. Netw."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"M\u00fcller, K.R., Mika, S., Tsuda, K., Sch\u00f6lkopf, K.: An introduction to kernel-based learning algorithms. In: Handbook of Neural Network Signal Processing, pp.\u00a04\u20131. CRC Press (2018)","DOI":"10.1201\/9781315220413-4"},{"issue":"2","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1109\/COMST.2018.2883147","volume":"21","author":"F Pacheco","year":"2019","unstructured":"Pacheco, F., Exposito, E., Gineste, M., Baudoin, C., Aguilar, J.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun. Surv. Tutor. 21(2), 1988\u20132014 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2883147","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5_CR17","unstructured":"Parmisano, A., Garcia, S., Erquiaga, M.J.: A labeled dataset with malicious and benign IoT network traffic. Stratosphere Laboratory, Praha, Czech Republic (2020)"},{"issue":"8","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1109\/TMC.2018.2866249","volume":"18","author":"A Sivanathan","year":"2019","unstructured":"Sivanathan, A., et al.: Classifying IoT devices in smart environments using network traffic characteristics. IEEE Trans. Mob. Comput. 18(8), 1745\u20131759 (2019). https:\/\/doi.org\/10.1109\/TMC.2018.2866249","journal-title":"IEEE Trans. Mob. Comput."},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Swessi, D., Idoudi, H.: A survey on Internet-of-Things security: threats and emerging countermeasures. Wireless Pers. Commun. (2022). https:\/\/doi.org\/10.1007\/s11277-021-09420-0","DOI":"10.1007\/s11277-021-09420-0"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Ullah, I., Mahmoud, Q.H.: A scheme for generating a dataset for anomalous activity detection in IoT networks. In: Advances in Artificial Intelligence: 33rd Canadian Conference on Artificial Intelligence, Canadian AI 2020, Ottawa, ON, Canada, 13\u201315 May 2020, Proceedings 33, pp. 508\u2013520. Springer (2020)","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"12073","DOI":"10.1007\/s00521-021-05924-9","volume":"33","author":"X Wang","year":"2021","unstructured":"Wang, X., Jin, B., Du, Y., Cui, P., Tan, Y., Yang, Y.: One-class graph neural networks for anomaly detection in attributed networks. Neural Comput. Appl. 33, 12073\u201312085 (2021)","journal-title":"Neural Comput. Appl."},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Xu, Z., Huang, X., Zhao, Y., Dong, Y., Li, J.: Contrastive attributed network anomaly detection with data augmentation. In: Advances in Knowledge Discovery and Data Mining: 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, 16\u201319 May 2022, Proceedings, Part II, pp. 444\u2013457. Springer (2022)","DOI":"10.1007\/978-3-031-05936-0_35"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Zheng, J., Li, D.: GCN-TC: combining trace graph with statistical features for network traffic classification. In: 2019 IEEE International Conference on Communications (ICC), ICC 2019, pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761115"},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6480172","volume":"2022","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Zeng, Z., Feng, T.: GCN-ETA: high-efficiency encrypted malicious traffic detection. Secur. Commun. Netw. 2022, 1\u201311 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"5_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102632","volume":"115","author":"F Zola","year":"2022","unstructured":"Zola, F., Segurola-Gil, L., Bruse, J.L., Galar, M., Orduna-Urrutia, R.: Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing. Comput. Secur. 115, 102632 (2022)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Structural, Syntactic, and Statistical Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80507-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T17:07:23Z","timestamp":1738256843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80507-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031805066","9783031805073"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80507-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"S+SSPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint IAPR International Workshops on Statistical Techniques in Pattern Recognition (SPR) and Structural and Syntactic Pattern Recognition (SSPR)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Venice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sspr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/s-sspr-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}