A large-scale data security detection method based on continuous time graph embedding framework

Z Liu, W Che, S Wang, J Xu, H Yin - Journal of Cloud Computing, 2023 - Springer
Z Liu, W Che, S Wang, J Xu, H Yin
Journal of Cloud Computing, 2023Springer
Graph representation learning has made significant strides in various fields, including
sociology and biology, in recent years. However, the majority of research has focused on
static graphs, neglecting the temporality and continuity of edges in dynamic graphs.
Furthermore, dynamic data are vulnerable to various security threats, such as data privacy
breaches and confidentiality attacks. To tackle this issue, the present paper proposes a data
security detection method based on a continuous-time graph embedding framework …
Abstract
Graph representation learning has made significant strides in various fields, including sociology and biology, in recent years. However, the majority of research has focused on static graphs, neglecting the temporality and continuity of edges in dynamic graphs. Furthermore, dynamic data are vulnerable to various security threats, such as data privacy breaches and confidentiality attacks. To tackle this issue, the present paper proposes a data security detection method based on a continuous-time graph embedding framework (CTDGE). The framework models temporal dependencies and embeds data using a graph representation learning method. A machine learning algorithm is then employed to classify and predict the embedded data to detect if it is secure or not. Experimental results show that this method performs well in data security detection, surpassing several dynamic graph embedding methods by 5% in terms of AUC metrics. Furthermore, the proposed framework outperforms other dynamic baseline methods in the node classification task of large-scale graphs containing 4321477 temporal information edges, resulting in a 10% improvement in the F1 score metric. The framework is also robust and scalable for application in various data security domains. This work is important for promoting the use of continuous-time graph embedding framework in the field of data security.
Springer
顯示最佳搜尋結果。 查看所有結果