Chapter 6. Strengthening Cybersecurity

In this chapter, we will describe how graphs can strengthen a cybersecurity system. We will demonstrate how graph analytics can identify root causes of a reported alert, detect bypassing of a firewall, and discover anomalous behavior such as flooding and footprinting. We will also show how graphs can find connections to suspicious IP addresses that may be responsible for attacks. After finishing this chapter you should be able to:

  • Understand how to apply graphs within the cybersecurity space

  • Build graph queries to trace microservices

  • Build graph queries to detect statistical anomalies

The Cost of Cyberattacks

In modern society, we rely on technology constantly challenged by cyberattacks that aim to damage, disrupt or maliciously control our IT infrastructure or our sensitive data. According to the Ponemon Institute, 66% of medium enterprises experience a cyberattack within twelve months1. These cyberattacks have become a daily threat to ...

Get Graph-Powered Analytics and Machine Learning with TigerGraph now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.