For the Botnet graphs, as we mainly explored learning on the graph topology itself, there are no particular features on the graph nodes and edges. For this, the initial node features are all 1's (same for every node) and no edge features, which are used to input to the GNNs.
We overlay simulated and real Botnet topologies (certain topologies observed during a Botnet attack) onto real network connections that are recorded from the real world.
Let me know if they are still unclear (we also have more details in our paper). Thanks!
Thank you for sharing the code of your publication its is really helpful. Can I ask about How did you structure the data into graphs?
Thanks a lot