13Artificial Intelligence for Threat Anomaly Detection Using Graph Databases – A Semantic Outlook

Edwiges G.H. Grata1, Anand Deshpande2, Ricardo T. Lopes3, Asif A. Laghari4, Abdullah A. Khan5, R. Jenice Aroma6, Kumudha Raimond7, Shoulin Yin8, and Awais Khan Jumani9

1Department of Telecommunications, Federal Fluminense University (UFF), Niterói, RJ, Brazil

2Electronics and Communication Engineering, Angadi Institute of Technology and Management, Belagavi, India

3Federal University of Rio de Janeiro (COPPE/UFRJ), Nuclear Engineering Laboratory (LIN), Rio de Janeiro, RJ, Brazil

4Sindh Madresstul Islam University, Karachi, Sindh, Pakistan

5Research Lab of Artificial Intelligence and Information Security, Faculty of Computing, Science and Information Technology, Benazir Bhutto Shaheed University, Karachi, Sindh, Pakistan

6Department of CSE, Karunya Institute of Technology and Sciences, Karunya University, Coimbatore, India

7Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India

8Shenyang Normal University, Shenyang, Liaoning Province, China

9Department of Computer Science, Sindh Madressa‐tul‐Islam University, Karachi, Sindh, Pakistan

13.1 Introduction

A comprehensive cybersecurity (CS) framework must help implement “cyber‐physical systems” (CPSs) effectively while managing potential security risks to accommodate the Internet of Things (IoT) hardware (HW) diversity [13]. Both factors are becoming increasingly crucial in infrastructure, ...

Get Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.