Graph Mining for Cybersecurity: A Survey

04/02/2023
by   Bo Yan, et al.
0

The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society. Securing cyberspace has become an utmost concern for organizations and governments. Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities. In recent years, with the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance. It is imperative to summarize existing graph-based cybersecurity solutions to provide a guide for future studies. Therefore, as a key contribution of this paper, we provide a comprehensive review of graph mining for cybersecurity, including an overview of cybersecurity tasks, the typical graph mining techniques, and the general process of applying them to cybersecurity, as well as various solutions for different cybersecurity tasks. For each task, we probe into relevant methods and highlight the graph types, graph approaches, and task levels in their modeling. Furthermore, we collect open datasets and toolkits for graph-based cybersecurity. Finally, we outlook the potential directions of this field for future research.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/26/2020

Graph Embedding for Combinatorial Optimization: A Survey

Graphs have been widely used to represent complex data in many applicati...
research
03/28/2023

A Survey on Malware Detection with Graph Representation Learning

Malware detection has become a major concern due to the increasing numbe...
research
02/24/2023

Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity

As cyber attacks continue to increase in frequency and sophistication, d...
research
04/13/2022

Reinforcement Learning on Graph: A Survey

Graph mining tasks arise from many different application domains, rangin...
research
09/08/2021

Knowledge mining of unstructured information: application to cyber-domain

Cyber intelligence is widely and abundantly available in numerous open o...
research
05/21/2021

Anomaly Mining – Past, Present and Future

Anomaly mining is an important problem that finds numerous applications ...
research
03/29/2022

Process Mining Analysis of Puzzle-Based Cybersecurity Training

The hands-on cybersecurity training quality is crucial to mitigate cyber...

Please sign up or login with your details

Forgot password? Click here to reset