Attack Graph Implementation in Graph Database | IEEE Conference Publication | IEEE Xplore

Attack Graph Implementation in Graph Database


Abstract:

Security Operation Centers (SOC) are essential to identify and analyze cyberattacks and defend networks from security incidents. Graph representations are frequently used...Show More

Abstract:

Security Operation Centers (SOC) are essential to identify and analyze cyberattacks and defend networks from security incidents. Graph representations are frequently used nowadays in order to correctly identify vulnerabilities and weaknesses in the system, as well as attack paths and potential methods of defense. This paper demonstrates a Labeled Property Graph data model based on STIX that makes efficient storage and querying of security-related objects possible, including a method for importing a sample STIX data set into Neo4j graph database.
Date of Conference: 15-17 September 2022
Date Added to IEEE Xplore: 13 February 2023
ISBN Information:

ISSN Information:

Conference Location: Subotica, Serbia

Contact IEEE to Subscribe

References

References is not available for this document.