Chapter 6. Strengthening Cybersecurity
In this chapter, we will describe how graphs can strengthen a cybersecurity system. We will demonstrate how graph analytics can identify root causes of a reported alert, detect bypassing of a firewall, and discover anomalous behavior such as flooding and footprinting. We will also show how graphs can find connections to suspicious IP addresses that may be responsible for attacks. After finishing this chapter you should be able to:
Understand how to apply graphs within the cybersecurity space
Build graph queries to trace microservices
Build graph queries to detect statistical anomalies
The Cost of Cyberattacks
In modern society, we rely on technology constantly challenged by cyberattacks that aim to damage, disrupt or maliciously control our IT infrastructure or our sensitive data. According to the Ponemon Institute, 66% of medium enterprises experience a cyberattack within twelve months1. These cyberattacks have become a daily threat to ...