Přehled o publikaci
2023
On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics
HUSÁK, Martin; Joseph KHOURY; Ðorđe KLISURA a Elias BOU-HARBZákladní údaje
Originální název
On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics
Autoři
HUSÁK, Martin; Joseph KHOURY; Ðorđe KLISURA a Elias BOU-HARB
Vydání
Cham, Switzerland, Complex Computational Ecosystems, od s. 167-179, 13 s. Lecture Notes in Computer Science 13927, 2023
Nakladatel
Springer Nature
Další údaje
Jazyk
angličtina
Typ výsledku
Stať ve sborníku
Stát vydavatele
Švýcarsko
Utajení
není předmětem státního či obchodního tajemství
Forma vydání
elektronická verze "online"
Odkazy
Označené pro přenos do RIV
Ne
Organizace
Ústav výpočetní techniky – Masarykova univerzita – Repozitář
ISBN
978-3-031-44354-1
ISSN
EID Scopus
Klíčová slova anglicky
Cyber security;Cyber situational awareness;Graph-based analytics;Large and complex network;Network security management
Návaznosti
EH22_010/0003229, projekt VaV.
Změněno: 6. 4. 2024 04:07, RNDr. Daniel Jakubík
Anotace
V originále
In this paper, we posit how semi-static (i.e., not changing very often) complex computer network-based intelligence using graphbased analytics can become enablers of Cyber Situational Awareness (CSA) (i.e., perception, comprehension, and projection of situations in a cyber environment). A plethora of newly surfaced cyber security researchers have used graph-based analytics to facilitate particular down tasks in dynamic complex cyber environments. This includes graph-, node- and edge-level detection, classification, and others (e.g., credit card fraudulent transactions as an edge classification problem). To the best of our knowledge, very limited efforts have consolidated the outputs of heterogeneous computer network monitoring and reconnaissance tools (e.g., Nmap) in enabling actionable CSA. As such, in this work, we address this literature gap while describing several use cases of graph traversal, graph measures, and subgraph mining in vulnerability and security state assessment, attack projection and mitigation, and device criticality estimation. We highlight the benefits of the graph-based approaches compared to traditional methods. Finally, we postulate open research and application challenges in graph-based analytics for CSA to prompt promising research directions and operational capabilities.