Attack Graph to Graph Database
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for future use, that the data is able to be looked up quickly, and that we can perform complex queries against the data stored in the database. There are many different emerging database types available for use, such as relational databases, key-value databases, object databases, graph databases, and RDF databases. Each type of database provides a unique set of qualities that have applications in various domains. Our work aims to investigate and compare the performance of relational databases to graph databases in terms of handling Attack Graph data. In this following project work, we transform the Attack graph data (stored in the xml format) to a Graph Database format using Neo4j. This converted format can be viewed using the Neo4j service & local host in the web browser. The further work of the project has also been attached
Authors and Affiliations
aurav Saraff
Intrusion Detection Systems By Anamoly-Based Using Neural Network
To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some  ...
Pseudonym Based Security Architecture for Wireless Mesh Network
Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable serv...
Implementation of Ecc Using Socket Programming In Java.
Abstract: Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and developers as it has got robust mathematical structure and higher security compared to algorithms like RSA (Rivest Adleman...
Novel Malware Clustering System Based on Kernel Data Structure
Abstract : An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system’s operations. Traditional malware detection approaches have based on the codecentricas...
Name Entity Detection and Relation Extraction from Unstructured Data by N-gram Features on Hidden Markov Model and Kernel Approach
Abstract: In recent years Name entity extraction and linking have received much attention. However, correct classification of entities and proper linking among these entities is a major challenge for researcher. We propo...