Contact Us
Go Back
October 2, 2023
5 min read

Graph-Powered Cybersecurity

Victor Lee
Graph-Powered Cybersecurity

Share:

If you’re reading this, then your daily personal and work life is probably dependent on information that is stored and accessed digitally. People and processes are working around the clock to keep these systems running smoothly. Likewise, others are working to disrupt, break into, or take control of these systems. The Ponemon Institute finds that 66% of small-medium enterprises experience a cyberattack within a year [1]. Cybersecurity aims to stop as many attacks as possible, but some attacks inevitably succeed.

Identifying a breach quickly is vital to minimize the damage – financial, operational, and reputational. But finding and then halting a cyberattack can be agonizingly slow – an average of 315 days [2], so there is lots of room for improvement. The average cost of a data breach could be as high as $5 million [3].

The Common Attack Pattern Enumerations and Classifications (CAPEC) initiative has defined more than 500 cyberattack patterns. Some examples of these patterns Abuse Existing Functionality, Collect and Analyze Information, and Inject Unexpected Items. Understanding these attack patterns is essential for analysts, developers, and IT architects to build effective cybersecurity systems.

 A graph data and analytics platform is an excellent way to model and search for these patterns, because graphs ARE connected data. To stop or detect cyberattacks, you need to be able to recognize the patterns, and trace them both upstream to their sources and downstream to your resources that are at risk. The patterns can be long, or wide with many things happening in parallel, or both long and wide. In this figure, we trace back from an alert to the login event and IP address that originally triggered the alert.

cybersecurity path

Figure 1. A linear path of  activity

Often an attack is the work of relatively few perpetrators. This is the case with DDOS flooding attacks: a few IP addresses or user IDs are sending a very high number of requests to the targeted servers. 

cybersecurity flooding

Figure 2. Tracing the IP addresses, events, and users that are making requests to particular servers

Graph platforms can integrate multiple data sources and process them in real-time: Information from many different microservices, user profiles, and user authorization systems all need to be looked at together to understand the activity, track down, and stop perpetrators. 

Our book Graph-Powered Analytics and Machine Learning has an entire chapter on cybersecurity with graph analytics, with example queries running on TigerGraph Cloud.

Get your free copy of the book today to learn about graph analytics concepts and use cases.

About the Author

Victor Lee

Learn More About PartnerGraph

TigerGraph Partners with organizations that offer
complementary technology solutions and services.
Dr. Jay Yu

Dr. Jay Yu | VP of Product and Innovation

Dr. Jay Yu is the VP of Product and Innovation at TigerGraph, responsible for driving product strategy and roadmap, as well as fostering innovation in graph database engine and graph solutions. He is a proven hands-on full-stack innovator, strategic thinker, leader, and evangelist for new technology and product, with 25+ years of industry experience ranging from highly scalable distributed database engine company (Teradata), B2B e-commerce services startup, to consumer-facing financial applications company (Intuit). He received his PhD from the University of Wisconsin - Madison, where he specialized in large scale parallel database systems

Todd Blaschka | COO

Todd Blaschka is a veteran in the enterprise software industry. He is passionate about creating entirely new segments in data, analytics and AI, with the distinction of establishing graph analytics as a Gartner Top 10 Data & Analytics trend two years in a row. By fervently focusing on critical industry and customer challenges, the companies under Todd's leadership have delivered significant quantifiable results to the largest brands in the world through channel and solution sales approach. Prior to TigerGraph, Todd led go to market and customer experience functions at Clustrix (acquired by MariaDB), Dataguise and IBM.