Score: 0

Integrating Graph Theoretical Approaches in Cybersecurity Education CSCI-RTED

Published: April 23, 2025 | arXiv ID: 2504.17059v1

By: Goksel Kucukkaya, Murat Ozer, Kazim Ciris

Potential Business Impact:

Helps computers find online dangers using network maps.

Business Areas:
Cyber Security Information Technology, Privacy and Security

As cybersecurity threats continue to evolve, the need for advanced tools to analyze and understand complex cyber environments has become increasingly critical. Graph theory offers a powerful framework for modeling relationships within cyber ecosystems, making it highly applicable to cybersecurity. This paper focuses on the development of an enriched version of the widely recognized NSL-KDD dataset, incorporating graph-theoretical concepts to enhance its practical value. The enriched dataset provides a resource for students and professionals to engage in hands-on analysis, enabling them to explore graph-based methodologies for identifying network behavior and vulnerabilities. To validate the effectiveness of this dataset, we employed IBM Auto AI, demonstrating its capability in real-world applications such as classification and threat prediction. By addressing the need for graph-theoretical datasets, this study provides a practical tool for equipping future cybersecurity professionals with the skills necessary to confront complex cyber challenges.

Country of Origin
🇺🇸 United States

Page Count
5 pages

Category
Computer Science:
Cryptography and Security