{"id":"https://openalex.org/W7124542976","doi":"https://doi.org/10.1007/s43926-025-00277-4","title":"Network topology security analysis and attack detection based on graph neural networks","display_name":"Network topology security analysis and attack detection based on graph neural networks","publication_year":2026,"publication_date":"2026-01-17","ids":{"openalex":"https://openalex.org/W7124542976","doi":"https://doi.org/10.1007/s43926-025-00277-4"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00277-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00277-4","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s43926-025-00277-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123289362","display_name":"Zhenhua Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I196038209","display_name":"Hunan University of Arts and Science","ror":"https://ror.org/01ggnn306","country_code":"CN","type":"education","lineage":["https://openalex.org/I196038209"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenhua Yang","raw_affiliation_strings":["School of Information Engineering, Hunan Applied Technology University, Changde, 415100, Hunan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Hunan Applied Technology University, Changde, 415100, Hunan, China","institution_ids":["https://openalex.org/I196038209"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101733679","display_name":"Minghong Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I196038209","display_name":"Hunan University of Arts and Science","ror":"https://ror.org/01ggnn306","country_code":"CN","type":"education","lineage":["https://openalex.org/I196038209"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Minghong Yang","raw_affiliation_strings":["School of Economics and Management, Hunan Applied Technology University, Changde, 415100, Hunan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Hunan Applied Technology University, Changde, 415100, Hunan, China","institution_ids":["https://openalex.org/I196038209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123276008","display_name":"Qiwen Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiwen Yang","raw_affiliation_strings":["School of Computer Science, Beihang University, Beijing, 100000, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beihang University, Beijing, 100000, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101733679"],"corresponding_institution_ids":["https://openalex.org/I196038209"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08299262,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7432000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7432000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.01679999940097332,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.011800000444054604,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7317000031471252},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4943000078201294},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4749999940395355},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.474700003862381},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4699000120162964},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4496000111103058},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44749999046325684},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.39100000262260437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7415000200271606},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7317000031471252},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4943000078201294},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4749999940395355},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.474700003862381},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4699000120162964},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4496000111103058},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44749999046325684},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4223000109195709},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.39100000262260437},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.3862999975681305},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.33820000290870667},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.3244999945163727},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3140000104904175},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31060001254081726},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.30649998784065247},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29490000009536743},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2705000042915344},{"id":"https://openalex.org/C32946077","wikidata":"https://www.wikidata.org/wiki/Q618079","display_name":"Network analysis","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00277-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00277-4","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7eb3d6f1c37d4ac682f4d555c7b539fe","is_oa":true,"landing_page_url":"https://doaj.org/article/7eb3d6f1c37d4ac682f4d555c7b539fe","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 6, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00277-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00277-4","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.562795877456665,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W3208773001","https://openalex.org/W4281860473","https://openalex.org/W4307042912","https://openalex.org/W4360584206","https://openalex.org/W4384931056","https://openalex.org/W4397001512","https://openalex.org/W4399492013","https://openalex.org/W4400867119","https://openalex.org/W4401410618","https://openalex.org/W4405311141","https://openalex.org/W4406002696","https://openalex.org/W4406559846","https://openalex.org/W4408749941"],"related_works":[],"abstract_inverted_index":{"As":[0,72],"the":[1,9,52,75,123,143,151,195,222],"complexity":[2],"of":[3,11,31,57,69,79,131,135,211],"computer":[4],"networks":[5],"continues":[6],"to":[7,25,35,50,93,111,142,150,214,218],"rise,":[8],"number":[10,134],"security":[12,170],"vulnerabilities":[13,158],"and":[14,46,61,77,97,105,121,138,159,167,198,202],"problems":[15],"will":[16],"also":[17],"increase.":[18],"Typical":[19],"intrusion":[20,39,184,219],"detection":[21,40,76,132,212],"systems":[22],"may":[23],"struggle":[24],"detect":[26],"complex":[27],"attacks.":[28],"The":[29,173],"purpose":[30],"this":[32],"study":[33],"is":[34,108,190],"provide":[36],"a":[37,73,85,109,164,208],"reliable":[38],"system":[41,176],"based":[42],"on":[43],"machine":[44],"learning":[45],"Graph":[47],"Neural":[48],"Networks":[49],"address":[51],"issues":[53],"stated":[54],"above.":[55],"Identification":[56],"communication":[58],"channels,":[59],"links,":[60],"patterns":[62],"can":[63,155],"be":[64],"achieved":[65],"through":[66],"graph-structural":[67],"modelling":[68],"network":[70,95,103,169,196],"topologies.":[71],"result,":[74],"classification":[78],"assaults":[80],"were":[81],"enhanced.":[82],"It":[83],"employs":[84],"one-of-a-kind":[86],"GNN":[87],"design":[88],"that":[89,182],"incorporates":[90],"attention":[91],"mechanisms":[92],"monitor":[94],"evolution":[96],"prioritize":[98],"essential":[99],"links.":[100],"Integration":[101],"across":[102],"topology":[104],"geographic":[106],"information":[107],"means":[110],"accomplish":[112],"these":[113],"objectives.":[114],"Using":[115],"benchmark":[116],"datasets":[117],"such":[118],"as":[119],"NSL-KDD":[120],"CICIDS2017,":[122],"proposed":[124,174],"GNN-IDS":[125,154],"demonstrated":[126],"superior":[127],"performance":[128],"in":[129,224],"terms":[130],"precision,":[133],"intrusions":[136],"detected,":[137],"false-positive":[139],"rate":[140],"compared":[141,213],"most":[144,215],"advanced":[145],"approaches":[146,217],"currently":[147],"available.":[148],"According":[149],"research":[152],"findings,":[153],"identify":[156],"new":[157],"attack":[160,180],"vectors,":[161],"making":[162],"it":[163],"scalable,":[165],"practical,":[166],"real-time":[168,191],"monitoring":[171],"tool.":[172],"GNN-based":[175],"identifies":[177],"hidden,":[178],"multi-hop":[179],"paths":[181],"conventional":[183],"detectors":[185],"cannot":[186],"detect.":[187],"This":[188,205],"model":[189,206],"adaptable,":[192],"continually":[193],"updating":[194],"graph":[197],"highlighting":[199],"significant":[200],"connections":[201],"attacker":[203],"patterns.":[204],"demonstrate":[207],"high":[209],"level":[210],"current":[216],"detection,":[220],"warranting":[221],"use":[223],"large":[225],"networks.":[226]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-01-19T00:00:00"}
