What is it about?
It is a comprehensive review of graph mining for cybersecurity, including an overview of cybersecurity tasks, the typical graph mining techniques, the general process of applying them to cybersecurity, and various solutions for different cybersecurity tasks. It probes relevant methods for each task and highlights the graph types, approaches, and task levels in their modeling. Furthermore, it collects open datasets and toolkits for graph-based cybersecurity. Finally, it outlooks the potential directions of this field for future research.
Featured Image
Photo by Jefferson Santos on Unsplash
Why is it important?
To the best of our knowledge, there is no comprehensive survey on graph-based cybersecurity applications. However, this kind of survey is urgently needed, considering the increasingly severe environment of cybersecurity. It can provide an overall reference for quickly designing graph-based cybersecurity solutions and also help later researchers avoid repetitive work. We also notice that there are several surveys on ML/DL in cybersecurity, as well as some surveys on graph mining techniques in other fields. A most relevant survey to ours only summarizes the earlier graph mining solutions for capturing propagation patterns of malware. In contrast, our survey covers a wide range of existing graph-based solutions for various cybersecurity tasks.
Perspectives
Read the Original
This page is a summary of: Graph Mining for Cybersecurity: A Survey, ACM Transactions on Knowledge Discovery from Data, November 2023, ACM (Association for Computing Machinery),
DOI: 10.1145/3610228.
You can read the full text:
Contributors
The following have contributed to this page