Efficient cybersecurity threat analysis through anomaly detection and graph summarization

Sharma, Pranjal, Homkar, Akshay, Jha, Sarvagya ORCID: https://orcid.org/0009-0004-5078-8227, Somasekar, J., Wbaid, Saef and Dixit, Krishna Kant (2026) Efficient cybersecurity threat analysis through anomaly detection and graph summarization. In: Graph mining : practical uses and instruments for exploring complex networks. Synthesis Lectures on Computer Science . Springer Cham, Cham, pp. 43-53. ISBN 9783031938047

Full text not available from this repository. (Request a copy)

Abstract

Cyber security threat analysis has become increasingly complex with the rapid growth of digital networks and sophisticated cyber-attacks. Traditional security measures struggle to efficiently detect and mitigate advanced threats. This study explores the use of anomaly detection and graph summarization techniques for efficient cyber security threat analysis. Anomaly detection is leveraged to identify unusual patterns in network traffic, enabling the early detection of potential threats. Graph summarization is utilized to reduce the complexity of network data while preserving essential structural information, facilitating faster and more accurate threat analysis. By combining these approaches, the proposed model enhances the scalability and efficiency of cyber security systems. The study investigates various anomaly detection algorithms, including graph-based and machine learning techniques, and evaluates their effectiveness in detecting advanced persistent threats (APTs) and zero-day attacks. Additionally, graph summarization methods such as clustering and graph coarsening are examined for their impact on processing speed and threat detection accuracy. Experimental results demonstrate significant improvements in threat detection rates and reduction in computational overhead. This research contributes to the development of intelligent cyber security systems capable of real-time threat analysis and proactive defense mechanisms, ensuring enhanced network security in an ever-evolving cyber landscape.

Item Type: Book Section
Uncontrolled Keywords: Anomaly detection | Cyber security | Graph summarization | Network security | Threat analysis
Subjects: Physical, Life and Health Sciences > Computer Science
Depositing User: Mr. Syed Anas
Date Deposited: 22 Apr 2026 07:05
Last Modified: 22 Apr 2026 07:05
Official URL: https://doi.org/10.1007/978-3-031-93802-3_4
URI: https://pure.jgu.edu.in/id/eprint/11125

Downloads

Downloads per month over past year

Actions (login required)

View Item
View Item