Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in March 2026 (Volume 29, Issue 3) Submit manuscript

Applications of graph theory in cybersecurity: Network defense models

Breadcrumb

  • Home
  • Applications of graph theory in cybersecurity: Network defense models

Shivakumar MD 1, * and Mamatha N 2

1 Lecturer in Science Department Government Polytechnic, Chamarajanagar-571313, Karnataka, India.
2 Lecturer in Science Department, Karnataka Government polytechnic, Mangalore, Karnataka, India.
Review Article
World Journal of Advanced Research and Reviews, 2022, 14(02), 735-743
Article DOI: 10.30574/wjarr.2022.14.2.0467
DOI url: https://doi.org/10.30574/wjarr.2022.14.2.0467
 
Received on 20 April 2022; Revised 28 April 2022; accepted on 01 May 2022
 
Graph theory has emerged as a fundamental mathematical framework for modeling, analyzing, and securing complex network infrastructures in cybersecurity. This paper explores the comprehensive applications of graph-theoretic models in network defense systems, examining how vertices, edges, and graph properties can effectively represent network topologies, threat propagation paths, and defensive strategies. Through systematic analysis of six key areas including network topology modeling, attack graph generation, intrusion detection systems, vulnerability assessment, threat intelligence, and advanced defense mechanisms, this research demonstrates the critical role of graph theory in modern cybersecurity frameworks. The paper synthesizes recent research findings and presents comparative analyses of various graph-based approaches, highlighting their strengths, limitations, and practical implementations in real- world network defense scenarios.
 
Graph theory Cybersecurity; Network defense models; Attack graphs; Network topology; Intrusion detection systems; Vulnerability assessment
 
https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2022-0467.pdf

Preview Article PDF

Shivakumar MD and Mamatha N. Applications of graph theory in cybersecurity: Network defense models. World Journal of Advanced Research and Reviews, 2022, 14(2), 735-743. Article DOI: https://doi.org/10.30574/wjarr.2022.14.2.0467

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution