Skip to main content

Activity and Event Network Graph and Application to Cyber-Physical Security

  • Chapter
  • First Online:
Artificial Intelligence for Cyber-Physical Systems Hardening

Abstract

The Activity and Event Network (AEN) is a new large graph model that enables describing and analyzing continuously in real-time key security relevant information about the operations of networked systems and data centers. The model allows identifying long-term and stealthy attack patterns, which may be difficult to capture using traditional approaches. The current chapter focuses on defining the model elements and the underlying graph construction algorithms, and presents a case study based on a cyberphysical security dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Casteigts A, Flocchini P, Quattrociocchi W, Santoro N (2012) Time-varying graphs and dynamic networks. Int J Parallel Emergent Distrib Syst 27(5):387–408

    Article  Google Scholar 

  2. Koroniotis N (2020) Designing an effective network forensic framework for the investigation of botnets in the Internet of Things. Ph.D. thesis, UNSW Canberra

    Google Scholar 

  3. Koroniotis N, Moustafa N (2020) Enhancing network forensics with particle swarm and deep learning: the particle deep framework. In: International conference on artificial intelligence and applications

    Google Scholar 

  4. Koroniotis N, Moustafa N, Schiliro F, Gauravaram P, Janicke H (2020) A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access 8:209802–209834

    Article  Google Scholar 

  5. Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Futur Gener Comput Syst 110:91–106

    Article  Google Scholar 

  6. Koroniotis N, Moustafa N, Sitnikova E, Slay J (2018) Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques. In: Hu J, Khalil I, Tari Z, Wen S (eds) Mobile networks and management. Springer International Publishing, Cham, pp 30–44

    Google Scholar 

  7. Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2018) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset

    Google Scholar 

  8. Nie C, Quinan PG, Traoré I, Woungang I (2022) Intrusion detection using a graphical fingerprint model. In: 2022 22nd IEEE international symposium on cluster, cloud and internet computing (CCGrid), pp 806–813

    Google Scholar 

  9. Quinan PG, Traore I, Gondhi UR, Woungang I (2022) Unsupervised anomaly detection using a new knowledge graph model for network activity and events. In: Renault E, Boumerdassi S, Mühlethaler P (eds) Machine learning for networking. Springer International Publishing, Cham, pp 117–130

    Chapter  Google Scholar 

  10. Yousef WA, Traore I, Briguglio W (2022) Classifier calibration: with application to threat scores in cybersecurity. IEEE Trans Dependable Secure Comput, pp 1–1

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paulo Gustavo Quinan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Quinan, P.G., Traoré, I., Woungang, I. (2023). Activity and Event Network Graph and Application to Cyber-Physical Security. In: Traore, I., Woungang, I., Saad, S. (eds) Artificial Intelligence for Cyber-Physical Systems Hardening. Engineering Cyber-Physical Systems and Critical Infrastructures, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-031-16237-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16237-4_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16236-7

  • Online ISBN: 978-3-031-16237-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics