D 2023

On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics

HUSÁK, Martin; Joseph KHOURY; Ðorđe KLISURA a Elias BOU-HARB

Základní údaje

Originální název

On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics

Autoři

HUSÁK, Martin; Joseph KHOURY; Ðorđe KLISURA a Elias BOU-HARB

Vydání

Cham, Switzerland, Complex Computational Ecosystems, od s. 167-179, 13 s. Lecture Notes in Computer Science 13927, 2023

Nakladatel

Springer Nature

Další údaje

Jazyk

angličtina

Typ výsledku

Stať ve sborníku

Stát vydavatele

Švýcarsko

Utajení

není předmětem státního či obchodního tajemství

Forma vydání

elektronická verze "online"

Odkazy

Označené pro přenos do RIV

Ne

Organizace

Ústav výpočetní techniky – Masarykova univerzita – Repozitář

ISBN

978-3-031-44354-1

ISSN

EID Scopus

Klíčová slova anglicky

Cyber security;Cyber situational awareness;Graph-based analytics;Large and complex network;Network security management

Návaznosti

EH22_010/0003229, projekt VaV.
Změněno: 6. 4. 2024 04:07, RNDr. Daniel Jakubík

Anotace

V originále

In this paper, we posit how semi-static (i.e., not changing very often) complex computer network-based intelligence using graphbased analytics can become enablers of Cyber Situational Awareness (CSA) (i.e., perception, comprehension, and projection of situations in a cyber environment). A plethora of newly surfaced cyber security researchers have used graph-based analytics to facilitate particular down tasks in dynamic complex cyber environments. This includes graph-, node- and edge-level detection, classification, and others (e.g., credit card fraudulent transactions as an edge classification problem). To the best of our knowledge, very limited efforts have consolidated the outputs of heterogeneous computer network monitoring and reconnaissance tools (e.g., Nmap) in enabling actionable CSA. As such, in this work, we address this literature gap while describing several use cases of graph traversal, graph measures, and subgraph mining in vulnerability and security state assessment, attack projection and mitigation, and device criticality estimation. We highlight the benefits of the graph-based approaches compared to traditional methods. Finally, we postulate open research and application challenges in graph-based analytics for CSA to prompt promising research directions and operational capabilities.

Přiložené soubory