Graph Mining for Cybersecurity: A Survey

by   Bo Yan, et al.
Beijing University of Posts and Telecommunications
Sichuan University
University of Notre Dame

The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society. Securing cyberspace has become an utmost concern for organizations and governments. Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities. In recent years, with the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance. It is imperative to summarize existing graph-based cybersecurity solutions to provide a guide for future studies. Therefore, as a key contribution of this paper, we provide a comprehensive review of graph mining for cybersecurity, including an overview of cybersecurity tasks, the typical graph mining techniques, and the general process of applying them to cybersecurity, as well as various solutions for different cybersecurity tasks. For each task, we probe into relevant methods and highlight the graph types, graph approaches, and task levels in their modeling. Furthermore, we collect open datasets and toolkits for graph-based cybersecurity. Finally, we outlook the potential directions of this field for future research.


page 1

page 2

page 3

page 4


Graph Embedding for Combinatorial Optimization: A Survey

Graphs have been widely used to represent complex data in many applicati...

A Survey on Malware Detection with Graph Representation Learning

Malware detection has become a major concern due to the increasing numbe...

Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity

As cyber attacks continue to increase in frequency and sophistication, d...

Reinforcement Learning on Graph: A Survey

Graph mining tasks arise from many different application domains, rangin...

Knowledge mining of unstructured information: application to cyber-domain

Cyber intelligence is widely and abundantly available in numerous open o...

Anomaly Mining – Past, Present and Future

Anomaly mining is an important problem that finds numerous applications ...

Process Mining Analysis of Puzzle-Based Cybersecurity Training

The hands-on cybersecurity training quality is crucial to mitigate cyber...

Please sign up or login with your details

Forgot password? Click here to reset