Attack Graph to Graph Database

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

 Abstract: Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for future use, that the data is able to be looked up quickly, and that we can perform complex queries against the data stored in the database. There are many different emerging database types available for use, such as relational databases, key-value databases, object databases, graph databases, and RDF databases. Each type of database provides a unique set of qualities that have applications in various domains. Our work aims to investigate and compare the performance of relational databases to graph databases in terms of handling Attack Graph data. In this following project work, we transform the Attack graph data (stored in the xml format) to a Graph Database format using Neo4j. This converted format can be viewed using the Neo4j service & local host in the web browser. The further work of the project has also been attached

Authors and Affiliations

aurav Saraff

Keywords

Related Articles

 Intrusion Detection Systems By Anamoly-Based Using Neural  Network

 To improve network security different steps has been taken as size and importance of the network has  increases day by day. Then chances of a network attacks increases Network is mainly attacked by some &nbsp...

 Pseudonym Based Security Architecture for Wireless Mesh Network

Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable serv...

 Implementation of Ecc Using Socket Programming In Java.

 Abstract: Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and developers as it has got robust mathematical structure and higher security compared to algorithms like RSA (Rivest Adleman...

Novel Malware Clustering System Based on Kernel Data Structure

Abstract : An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system’s operations. Traditional malware detection approaches have based on the codecentricas...

 Name Entity Detection and Relation Extraction from Unstructured Data by N-gram Features on Hidden Markov Model and Kernel Approach

Abstract: In recent years Name entity extraction and linking have received much attention. However, correct classification of entities and proper linking among these entities is a major challenge for researcher. We propo...

Download PDF file
  • EP ID EP152597
  • DOI 10.9790/0661-16442934
  • Views 91
  • Downloads 0

How To Cite

aurav Saraff (2014).  Attack Graph to Graph Database. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 29-34. https://europub.co.uk/articles/-A-152597