Applications of graph theory in cybersecurity: Network defense models
1 Lecturer in Science Department Government Polytechnic, Chamarajanagar-571313, Karnataka, India.
2 Lecturer in Science Department, Karnataka Government polytechnic, Mangalore, Karnataka, India.
Review Article
World Journal of Advanced Research and Reviews, 2022, 14(02), 735–743
Publication history:
Received on 20 April 2022; Revised 28 April 2022; accepted on 01 May 2022
Abstract:
Graph theory has emerged as a fundamental mathematical framework for modeling, analyzing, and securing complex network infrastructures in cybersecurity. This paper explores the comprehensive applications of graph-theoretic models in network defense systems, examining how vertices, edges, and graph properties can effectively represent network topologies, threat propagation paths, and defensive strategies. Through systematic analysis of six key areas including network topology modeling, attack graph generation, intrusion detection systems, vulnerability assessment, threat intelligence, and advanced defense mechanisms, this research demonstrates the critical role of graph theory in modern cybersecurity frameworks. The paper synthesizes recent research findings and presents comparative analyses of various graph-based approaches, highlighting their strengths, limitations, and practical implementations in real- world network defense scenarios.
Keywords:
Graph theory Cybersecurity; Network defense models; Attack graphs; Network topology; Intrusion detection systems; Vulnerability assessment
Full text article in PDF:
Copyright information:
Copyright © 2022 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0
