Attack Graph to Graph Database
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for future use, that the data is able to be looked up quickly, and that we can perform complex queries against the data stored in the database. There are many different emerging database types available for use, such as relational databases, key-value databases, object databases, graph databases, and RDF databases. Each type of database provides a unique set of qualities that have applications in various domains. Our work aims to investigate and compare the performance of relational databases to graph databases in terms of handling Attack Graph data. In this following project work, we transform the Attack graph data (stored in the xml format) to a Graph Database format using Neo4j. This converted format can be viewed using the Neo4j service & local host in the web browser. The further work of the project has also been attached
Authors and Affiliations
aurav Saraff
Task Scheduling using Hybrid Algorithm in Cloud ComputingEnvironments
[u][/u]Abstract: The cloud computing is considered the latest network infrastructure that supports thedecentralization of computing. The main features of the Cloud are the possibilities for building applicationsand provi...
Scalable Image Classification Using Compression
The increasing rate of data growth has led to finding techniques for faster processing of data. Big Data analytics has recently emerged as a promising field for examining huge volume of datasets containing differen...
Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity
Abstract: The project discussed here is an Android messenger application which connects using Bluetooth. The main concepts discussed here are : i) Bluetooth connection between two or more android smart phones, wher...
Human Being Character Analysis from Their Social Networking Profiles
In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays...
Automated Detection of Cancerous Lung Nodule from the Computed Tomography Images
An automated Computer Aided Diagnosis (CAD) system is proposed in this paper for the detection of lung nodule from the computed tomography (CT) images. CT Images are more efficient and provideappropriate detai...