Přehled o publikaci
	
		
		
		2022
			
	    
	
	
    Complex Networks in Cybersecurity: Applications and Challenges
HUSÁK, MartinBasic information
Original name
Complex Networks in Cybersecurity: Applications and Challenges
	Authors
HUSÁK, Martin
			Edition
 ACONTA'22 : First European Conference on Augmented Complex Networks - Trustworthy Analysis, 2022
			Other information
Language
English
		Type of outcome
Requested lectures
		Country of publisher
United States of America
		Confidentiality degree
is not subject to a state or trade secret
		Organization
Ústav výpočetní techniky – Repository – Repository
			Keywords in English
graph;complex network;cybersecurity;cyber situational awareness
		Links
EF16_019/0000822, research and development project. 
			
				
				Changed: 16/12/2022 04:11, RNDr. Daniel Jakubík
				
		Abstract
In the original language
Graph-based data representation is very popular in many research areas, including the field of cybersecurity, in which the community uses the so-called attacks graphs to model the cyber attacks since mid 90'. However, with the increasing complexity of cyber attacks and the protected systems, the attack models are growing and becoming complex networks. In this talk, we will show how complex networks can be used to model the protected systems (including large networks and infrastructures) and how they help in proactive and reactive cyber defense. We will go through several existing approaches and tools (e.g., CyGraph by MITRE, CRUSOE by CSIRT-MU) and discuss the challenges related to the everchanging threat landscape, insufficient or incompatible ontologies, and heterogeneity and frequent unavailability of relevant cybersecurity data that complicate the mining and other advanced analyses.