{"id":"https://openalex.org/W4409712865","doi":"https://doi.org/10.1186/s42400-024-00296-8","title":"BS-GAT: a network intrusion detection system based on graph neural network for edge computing","display_name":"BS-GAT: a network intrusion detection system based on graph neural network for edge computing","publication_year":2025,"publication_date":"2025-04-24","ids":{"openalex":"https://openalex.org/W4409712865","doi":"https://doi.org/10.1186/s42400-024-00296-8"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00296-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00296-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00296-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00296-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101721161","display_name":"Yalu Wang","orcid":"https://orcid.org/0000-0003-3823-6230"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yalu Wang","raw_affiliation_strings":["School of Computer and Information Engineering, Henan University, Long Ting District, Kaifeng, 475004, Henan, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Henan University, Long Ting District, Kaifeng, 475004, Henan, People\u2019s Republic of China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108050175","display_name":"Zhijie Han","orcid":"https://orcid.org/0000-0002-7362-7520"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhijie Han","raw_affiliation_strings":["School of Software, Henan University, Long Ting District, Kaifeng, 475004, Henan, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Software, Henan University, Long Ting District, Kaifeng, 475004, Henan, People\u2019s Republic of China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010727676","display_name":"Ying Du","orcid":null},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]},{"id":"https://openalex.org/I4210163873","display_name":"Zhengzhou University of Industrial Technology","ror":"https://ror.org/05es8as59","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210163873"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Du","raw_affiliation_strings":["Henan Engineering Research Center for Industrial Internet of Things, Zhengzhou, 450046, People\u2019s Republic of China","Henan Province Engineering Research Center of Spatial Information Processing, Henan University, Kaifeng, 475004, People\u2019s Republic of China","School of Computer and Information Engineering, Henan University, Long Ting District, Kaifeng, 475004, Henan, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Henan Engineering Research Center for Industrial Internet of Things, Zhengzhou, 450046, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210163873"]},{"raw_affiliation_string":"Henan Province Engineering Research Center of Spatial Information Processing, Henan University, Kaifeng, 475004, People\u2019s Republic of China","institution_ids":["https://openalex.org/I173899330"]},{"raw_affiliation_string":"School of Computer and Information Engineering, Henan University, Long Ting District, Kaifeng, 475004, Henan, People\u2019s Republic of China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100679241","display_name":"Jie Li","orcid":"https://orcid.org/0000-0002-4974-6116"},"institutions":[{"id":"https://openalex.org/I192868223","display_name":"Zhengzhou University of Aeronautics","ror":"https://ror.org/01qjyzh50","country_code":"CN","type":"education","lineage":["https://openalex.org/I192868223"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["School of Intelligent Engineering, Zhengzhou University of Aeronautics, Zhengzhou, 450046, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Intelligent Engineering, Zhengzhou University of Aeronautics, Zhengzhou, 450046, People\u2019s Republic of China","institution_ids":["https://openalex.org/I192868223"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110117463","display_name":"Xin He","orcid":"https://orcid.org/0000-0003-0755-0964"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin He","raw_affiliation_strings":["School of Software, Henan University, Long Ting District, Kaifeng, 475004, Henan, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Software, Henan University, Long Ting District, Kaifeng, 475004, Henan, People\u2019s Republic of China","institution_ids":["https://openalex.org/I173899330"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101721161"],"corresponding_institution_ids":["https://openalex.org/I173899330"],"apc_list":null,"apc_paid":null,"fwci":22.5814,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.99434067,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.685919463634491},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5313490033149719},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4587794244289398},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.45400428771972656},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4163259267807007},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3423303961753845},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2336137890815735},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22522881627082825}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.685919463634491},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5313490033149719},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4587794244289398},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.45400428771972656},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4163259267807007},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3423303961753845},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2336137890815735},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22522881627082825}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00296-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00296-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00296-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d5c3d8fd9235441193d42de6f9f54662","is_oa":true,"landing_page_url":"https://doaj.org/article/d5c3d8fd9235441193d42de6f9f54662","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-18 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00296-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00296-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00296-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4409712865.pdf","grobid_xml":"https://content.openalex.org/works/W4409712865.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1487260974","https://openalex.org/W2060854787","https://openalex.org/W2170196582","https://openalex.org/W2752533296","https://openalex.org/W2792290891","https://openalex.org/W2923477440","https://openalex.org/W2963748489","https://openalex.org/W2964015378","https://openalex.org/W2986736896","https://openalex.org/W2996900869","https://openalex.org/W3034384938","https://openalex.org/W3036195893","https://openalex.org/W3089307587","https://openalex.org/W3091724539","https://openalex.org/W3102359135","https://openalex.org/W3120934607","https://openalex.org/W3123909522","https://openalex.org/W3162956350","https://openalex.org/W3172408309","https://openalex.org/W3188579603","https://openalex.org/W3208773001","https://openalex.org/W3211805421","https://openalex.org/W3216081894","https://openalex.org/W3217748719","https://openalex.org/W4206130810","https://openalex.org/W4211114749","https://openalex.org/W4285308793","https://openalex.org/W4286579686","https://openalex.org/W4286580755","https://openalex.org/W4297733535","https://openalex.org/W4307986628","https://openalex.org/W4321608114","https://openalex.org/W4366133297","https://openalex.org/W4367669895","https://openalex.org/W4377968952","https://openalex.org/W4380682492","https://openalex.org/W6910496099"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2364419519","https://openalex.org/W2360767377","https://openalex.org/W2017948608","https://openalex.org/W2360951146"],"abstract_inverted_index":{"Abstract":[0],"The":[1,221],"emergence":[2],"of":[3,15,57,97,107,162,168,189,209],"Edge":[4,19],"Computing":[5,20],"has":[6],"led":[7],"to":[8,26,63,69,92,137,205],"an":[9,160],"increasingly":[10],"intricate":[11],"and":[12,30,74,145,182,231,242,260],"widespread":[13],"issue":[14],"network":[16,34,42,65,125,135,216,218],"infiltration":[17],"in":[18,83,104,110,115,217,270],"devices.":[21],"Therefore,":[22],"it":[23],"is":[24,156,228],"crucial":[25],"explore":[27],"intelligent,":[28],"automated,":[29],"resilient":[31],"methods":[32,56,81],"for":[33,41],"intrusion":[35,43,66,111,219],"detection.":[36,220],"Graph":[37],"neural":[38,124],"network-based":[39],"techniques":[40],"detection":[44,112],"have":[45],"been":[46],"proposed":[47,211,226],"by":[48],"many":[49],"scholars":[50],"recently.":[51],"However,":[52],"the":[53,80,84,94,139,166,174,177,187,190,194,201,207,210,225,250,255,261],"graph":[54,76,123,133,147,153,183,214],"construction":[55],"these":[58],"approaches":[59],"cannot":[60],"fully":[61],"adapt":[62],"real":[64,163],"datasets,":[67],"leading":[68],"problems":[70],"such":[71],"as":[72],"overfitting":[73,144],"insufficient":[75],"information":[77,148],"mining.":[78],"Furthermore,":[79],"employed":[82],"model":[85],"training":[86],"phase":[87],"are":[88],"relatively":[89],"limited,":[90],"failing":[91],"consider":[93],"characteristic":[95],"presence":[96],"grouping":[98],"within":[99],"networks.":[100],"These":[101],"shortcomings":[102],"result":[103],"a":[105,122,132,150,267],"lack":[106],"high":[108],"accuracy":[109,243,252],"systems,":[113],"especially":[114],"multi-class":[116,248,271],"classification":[117],"scenarios.":[118],"This":[119],"research":[120],"suggests":[121],"technique":[126],"based":[127],"on":[128],"behavior":[129,212],"similarity":[130],"employing":[131],"attention":[134,215],"(BS-GAT)":[136],"handle":[138],"aforementioned":[140],"problem.":[141],"To":[142],"address":[143],"inadequate":[146],"mining,":[149],"behavioral":[151,170],"similarity-based":[152,213],"creation":[154],"method":[155],"first":[157],"presented":[158],"through":[159],"analysis":[161],"datasets.":[164],"Subsequently,":[165],"inclusion":[167],"edge":[169],"relationship":[171,178],"weights":[172],"into":[173],"GAT":[175],"leverages":[176],"between":[179],"data":[180],"flow":[181],"structural":[184],"information,":[185],"enhancing":[186],"performance":[188],"trained":[191],"model.":[192],"In":[193,236],"final":[195],"stage,":[196],"experiments":[197],"were":[198],"executed":[199],"using":[200],"most":[202],"recent":[203],"datasets":[204],"assess":[206],"effectiveness":[208],"findings":[222],"indicate":[223],"that":[224],"approach":[227],"highly":[229],"effective":[230],"significantly":[232],"outperforms":[233],"existing":[234],"solutions.":[235],"binary":[237],"classification,":[238],"recall,":[239],"precision,":[240],"f1-score,":[241],"all":[244],"exceed":[245],"99%.":[246],"For":[247],"performance,":[249],"recognition":[251,272],"exceeds":[253,264],"93%,":[254],"weighted":[256,262],"recall":[257],"surpasses":[258],"91%,":[259],"f1-score":[263],"92%,":[265],"showing":[266],"substantial":[268],"improvement":[269],"effectiveness.":[273]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":12}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
