Fig 1.
A flowchart of the data preprocessing pipeline.
Fig 2.
A flowchart of the model training pipeline.
Fig 3.
The proposed architecture.
Table 1.
System specifications and setup used in the study.
Fig 4.
Samples of nodes in the training, validation and test sets of the graphs.
Fig 5.
The change in performance for both training and validation sets as training progresses.
Fig 6.
Node embeddings from the proposed model on the test set.
Table 2.
Comparing GConvTrans and recent state-of-the-art intrusion detection models.