International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJSAT
Upcoming Conference(s) ↓
Conferences Published ↓
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 17 Issue 1
January-March 2026
Indexing Partners
Graph Neural Networks for Anomaly Detection in Encrypted Network Traffic Flows
| Author(s) | Ms. Omowunmi Folashayo Makinde |
|---|---|
| Country | United States |
| Abstract | The proliferation of encrypted network traffic has created significant challenges for traditional anomaly detection systems that rely on deep packet inspection and payload analysis. As organizations increasingly adopt encryption protocols to protect data privacy and security, the ability to identify malicious activities within encrypted traffic flows has become a critical concern for network security professionals. This research explores the application of Graph Neural Networks as a novel approach to detecting anomalies in encrypted network traffic without compromising the confidentiality of the encrypted data. The study demonstrates how GNN architectures can effectively model the complex relationships and patterns inherent in network traffic flows by representing them as graph structures. Through extensive experimentation on real-world encrypted traffic datasets, the proposed methodology achieves detection accuracy rates exceeding 94 percent while maintaining low false positive rates below 3 percent. The research findings indicate that graph-based representations of network flows, combined with deep learning techniques, offer a promising solution to the growing challenge of securing encrypted communications. This work contributes to the field by providing a comprehensive framework for implementing GNN-based anomaly detection systems that respect privacy requirements while maintaining robust security monitoring capabilities. |
| Keywords | Graph Neural Networks, Anomaly Detection, Encrypted Traffic Analysis, Network Security, Deep Learning, Traffic Flow Patterns |
| Field | Computer > Network / Security |
| Published In | Volume 16, Issue 4, October-December 2025 |
| Published On | 2025-10-28 |
| DOI | https://doi.org/10.71097/IJSAT.v16.i4.9040 |
| Short DOI | https://doi.org/g98nct |
Share this

CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.