What is it about?

It is a comprehensive review of graph mining for cybersecurity, including an overview of cybersecurity tasks, the typical graph mining techniques, the general process of applying them to cybersecurity, and various solutions for different cybersecurity tasks. It probes relevant methods for each task and highlights the graph types, approaches, and task levels in their modeling. Furthermore, it collects open datasets and toolkits for graph-based cybersecurity. Finally, it outlooks the potential directions of this field for future research.

Featured Image

Why is it important?

To the best of our knowledge, there is no comprehensive survey on graph-based cybersecurity applications. However, this kind of survey is urgently needed, considering the increasingly severe environment of cybersecurity. It can provide an overall reference for quickly designing graph-based cybersecurity solutions and also help later researchers avoid repetitive work. We also notice that there are several surveys on ML/DL in cybersecurity, as well as some surveys on graph mining techniques in other fields. A most relevant survey to ours only summarizes the earlier graph mining solutions for capturing propagation patterns of malware. In contrast, our survey covers a wide range of existing graph-based solutions for various cybersecurity tasks.

Perspectives

It summarizes existing graph-based cybersecurity solutions to provide a guide for future studies.

Bo Yan
Beijing University of Posts and Telecommunications

Read the Original

This page is a summary of: Graph Mining for Cybersecurity: A Survey, ACM Transactions on Knowledge Discovery from Data, November 2023, ACM (Association for Computing Machinery),
DOI: 10.1145/3610228.
You can read the full text:

Read

Contributors

The following have contributed to this page