POSTER: Security Logs Graph Analytics for Industry Network System.
Qiaoran MengNay OoHoon Wei LimBiplab SikdarPublished in: AsiaCCS (2023)
Keyphrases
- security threats
- small world
- computer networks
- complex networks
- security protection
- intrusion detection
- network connection
- enterprise network
- network structure
- network traffic
- network management
- buffer overflow
- big data
- virtual private network
- network security
- application level
- case study
- random graphs
- denial of service attacks
- cyber attacks
- spanning tree
- graph structure
- learning analytics
- peer to peer
- wireless sensor networks
- graphical representation
- security issues
- graph theory
- strongly connected
- directed graph
- network access
- internet service providers
- social network analysis
- access control
- data management