p 2022

Complex Networks in Cybersecurity: Applications and Challenges

HUSÁK, Martin

Basic information

Original name

Complex Networks in Cybersecurity: Applications and Challenges

Authors

HUSÁK, Martin

Edition

ACONTA'22 : First European Conference on Augmented Complex Networks - Trustworthy Analysis, 2022

Other information

Language

English

Type of outcome

Vyžádané přednášky

Country of publisher

United States of America

Confidentiality degree

není předmětem státního či obchodního tajemství

Organization

Ústav výpočetní techniky – Repository – Repository

Keywords in English

graph;complex network;cybersecurity;cyber situational awareness

Links

EF16_019/0000822, research and development project.
Změněno: 16/12/2022 04:11, RNDr. Daniel Jakubík

Abstract

V originále

Graph-based data representation is very popular in many research areas, including the field of cybersecurity, in which the community uses the so-called attacks graphs to model the cyber attacks since mid 90'. However, with the increasing complexity of cyber attacks and the protected systems, the attack models are growing and becoming complex networks. In this talk, we will show how complex networks can be used to model the protected systems (including large networks and infrastructures) and how they help in proactive and reactive cyber defense. We will go through several existing approaches and tools (e.g., CyGraph by MITRE, CRUSOE by CSIRT-MU) and discuss the challenges related to the everchanging threat landscape, insufficient or incompatible ontologies, and heterogeneity and frequent unavailability of relevant cybersecurity data that complicate the mining and other advanced analyses.

Files attached