Integrating Graph Theoretical Approaches in Cybersecurity Education CSCI-RTED
By: Goksel Kucukkaya, Murat Ozer, Kazim Ciris
Potential Business Impact:
Helps computers find online dangers using network maps.
As cybersecurity threats continue to evolve, the need for advanced tools to analyze and understand complex cyber environments has become increasingly critical. Graph theory offers a powerful framework for modeling relationships within cyber ecosystems, making it highly applicable to cybersecurity. This paper focuses on the development of an enriched version of the widely recognized NSL-KDD dataset, incorporating graph-theoretical concepts to enhance its practical value. The enriched dataset provides a resource for students and professionals to engage in hands-on analysis, enabling them to explore graph-based methodologies for identifying network behavior and vulnerabilities. To validate the effectiveness of this dataset, we employed IBM Auto AI, demonstrating its capability in real-world applications such as classification and threat prediction. By addressing the need for graph-theoretical datasets, this study provides a practical tool for equipping future cybersecurity professionals with the skills necessary to confront complex cyber challenges.
Similar Papers
Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and Opportunities
Cryptography and Security
Helps computers fight new cyberattacks better.
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
Cryptography and Security
Finds sneaky computer break-ins by watching how people use systems.
A Research and Development Portfolio of GNN Centric Malware Detection, Explainability, and Dataset Curation
Cryptography and Security
Finds computer viruses faster and explains how.