Useful Links
Computer Science
Cybersecurity
Graph-Based Cybersecurity
1. Introduction to Graph-Based Cybersecurity
2. Foundational Graph Theory
3. Cybersecurity Domain Modeling
4. Graph Analytics for Cybersecurity
5. Core Security Applications
6. Implementation and Operationalization
7. Advanced Topics and Emerging Trends
Cybersecurity Domain Modeling
Graph Schema Design
Schema Definition Principles
Node Type Hierarchies
Edge Type Taxonomies
Property Schema Design
Temporal Modeling Approaches
Time-Stamped Elements
Dynamic Graph Structures
Snapshot vs Streaming Models
Temporal Aggregation Strategies
Schema Evolution and Versioning
Schema Migration Strategies
Backward Compatibility
Security Entity Modeling
Identity and User Entities
Human Users
Service Accounts
System Accounts
Identity Providers
Authentication Tokens
System and Infrastructure Entities
Physical Devices
Workstations
Servers
Network Equipment
Mobile Devices
IoT Devices
Virtual Resources
Virtual Machines
Containers
Cloud Instances
Network Components
Subnets and VLANs
Firewalls and Gateways
Load Balancers
Software and Application Entities
Installed Applications
Running Processes
Services and Daemons
Libraries and Dependencies
Data and Information Entities
Files and Documents
Databases and Tables
Configuration Files
Logs and Events
Security-Specific Entities
Vulnerabilities
Threats and Indicators
Security Alerts
Incidents and Cases
Policies and Rules
Relationship and Activity Modeling
Network Communication Relationships
TCP/UDP Connections
HTTP/HTTPS Sessions
DNS Queries and Responses
Email Communications
Authentication and Authorization Relationships
Login Events
Permission Grants
Role Assignments
Access Attempts
System Activity Relationships
Process Execution
File Operations
Registry Modifications
Service Interactions
Data Flow Relationships
Data Transfers
API Calls
Database Queries
Backup Operations
Security Event Relationships
Alert Correlations
Incident Linkages
Threat Associations
Previous
2. Foundational Graph Theory
Go to top
Next
4. Graph Analytics for Cybersecurity