J 2024

A review on graph-based approaches for network security monitoring and botnet detection

LAGRAA, Sofiane; Martin HUSÁK; Hamida SEBA; Satyanarayana VUPPALA; Radu STATE et. al.

Basic information

Original name

A review on graph-based approaches for network security monitoring and botnet detection

Authors

LAGRAA, Sofiane; Martin HUSÁK (203 Czech Republic, guarantor, belonging to the institution); Hamida SEBA; Satyanarayana VUPPALA; Radu STATE and Moussa OUEDRAOGO

Edition

International Journal of Information Security, Springer, 2024, 1615-5262

Other information

Language

English

Type of outcome

Article in a journal

Field of Study

10200 1.2 Computer and information sciences

Country of publisher

United States of America

Confidentiality degree

is not subject to a state or trade secret

References:

Impact factor

Impact factor: 2.400 in 2023

RIV identification code

RIV/00216224:14610/24:00135191

Organization unit

Institute of Computer Science

UT WoS

001062032500001

EID Scopus

2-s2.0-85169463507

Keywords in English

Graph theory;Machine learning;Network security;Botnet detection;Monitoring;Cybersecurity

Tags

Tags

International impact, Reviewed
Changed: 24/3/2025 15:25, Mgr. Eva Špillingová

Abstract

V originále

This survey paper provides a comprehensive overview of recent research and development in network security that uses graphs and graph-based data representation and analytics. The paper focuses on the graph-based representation of network traffic records and the application of graph-based analytics in intrusion detection and botnet detection. The paper aims to answer several questions related to graph-based approaches in network security, including the types of graphs used to represent network security data, the approaches used to analyze such graphs, the metrics used for detection and monitoring, and the reproducibility of existing works. The paper presents a survey of graph models used to represent, store, and visualize network security data, a survey of the algorithms and approaches used to analyze such data, and an enumeration of the most important graph features used for network security analytics for monitoring and botnet detection. The paper also discusses the challenges and limitations of using graph-based approaches in network security and identifies potential future research directions. Overall, this survey paper provides a valuable resource for researchers and practitioners in the field of network security who are interested in using graph-based approaches for analyzing and detecting malicious activities in networks.

Links

EF16_019/0000822, research and development project
Name: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur