Attack Graph to Graph Database

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

 Abstract: Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for future use, that the data is able to be looked up quickly, and that we can perform complex queries against the data stored in the database. There are many different emerging database types available for use, such as relational databases, key-value databases, object databases, graph databases, and RDF databases. Each type of database provides a unique set of qualities that have applications in various domains. Our work aims to investigate and compare the performance of relational databases to graph databases in terms of handling Attack Graph data. In this following project work, we transform the Attack graph data (stored in the xml format) to a Graph Database format using Neo4j. This converted format can be viewed using the Neo4j service & local host in the web browser. The further work of the project has also been attached

Authors and Affiliations

aurav Saraff

Keywords

Related Articles

An EfficientHybrid Push-Pull Based Protocol for VOD In Peer-to-Peer network

 Abstract : Video-on-Demand is a service where movies are delivered to distributed users with low delay and free interactivity. The traditional client-server architecture experiences scalability issues to provide vi...

 Application of Machine Learning Algorithm in Indian Stock Market Data

 Abstract: Prediction of Indian stock market data with data mining technique is one of the fascinating issues for researchers over the past decade. Statistical and traditional methods are no longer feasible for prop...

 Class Diagram Extraction from Textual Requirements Using NLPTechniques

 Abstract: A new method for translating software requirements to object-oriented model is proposed. Softwarerequirements specified in a natural language using scenario like format will be transformed into class diag...

 Exponential software reliability using SPRT: MLE

 In Classical Hypothesis testing volumes of data is to be collected and then the conclusions are drawn, which may need more time. But, Sequential Analysis of Statistical science could be adopted in order to  ...

Text Extraction of Vehicle Number Plate and Document Images Using Discrete Wavelet Transform in MATLAB

Text Extraction from colour images is a challenging task in computer vision. The concept of text extraction is derived from the vehicle plate recognization and their characters extractions individually. Some examples of...

Download PDF file
  • EP ID EP152597
  • DOI 10.9790/0661-16442934
  • Views 103
  • Downloads 0

How To Cite

aurav Saraff (2014).  Attack Graph to Graph Database. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 29-34. https://europub.co.uk/articles/-A-152597