International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 4
October-December 2025
Indexing Partners
Graph Neural Networks for Anomaly Detection in Encrypted Network Traffic Flows
| Author(s) | Ms. Omowunmi Folashayo Makinde |
|---|---|
| Country | United States |
| Abstract | The proliferation of encrypted network traffic has created significant challenges for traditional anomaly detection systems that rely on deep packet inspection and payload analysis. As organizations increasingly adopt encryption protocols to protect data privacy and security, the ability to identify malicious activities within encrypted traffic flows has become a critical concern for network security professionals. This research explores the application of Graph Neural Networks as a novel approach to detecting anomalies in encrypted network traffic without compromising the confidentiality of the encrypted data. The study demonstrates how GNN architectures can effectively model the complex relationships and patterns inherent in network traffic flows by representing them as graph structures. Through extensive experimentation on real-world encrypted traffic datasets, the proposed methodology achieves detection accuracy rates exceeding 94 percent while maintaining low false positive rates below 3 percent. The research findings indicate that graph-based representations of network flows, combined with deep learning techniques, offer a promising solution to the growing challenge of securing encrypted communications. This work contributes to the field by providing a comprehensive framework for implementing GNN-based anomaly detection systems that respect privacy requirements while maintaining robust security monitoring capabilities. |
| Keywords | Graph Neural Networks, Anomaly Detection, Encrypted Traffic Analysis, Network Security, Deep Learning, Traffic Flow Patterns |
| Field | Computer > Network / Security |
| Published In | Volume 16, Issue 4, October-December 2025 |
| Published On | 2025-10-28 |
| DOI | https://doi.org/10.71097/IJSAT.v16.i4.9040 |
| Short DOI | https://doi.org/g98nct |
Share this

CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.