Title :
Graph analytics for signature discovery
Author :
Hogan, Emilie ; Johnson, James R. ; Halappanavar, Mahantesh ; Chaomei Lo
Author_Institution :
Pacific Northwest Nat. Lab., Richland, WA, USA
Abstract :
Within large amounts of seemingly unstructured data it can be diffcult to find signatures of events. In our work we transform unstructured data into a graph representation. By doing this we expose underlying structure in the data and can take advantage of existing graph analytics capabilities, as well as develop new capabilities. Currently we focus on applications in cybersecurity and communication domains. Within cybersecurity we aim to find signatures for perpetrators using the pass-the-hash attack, and in communications we look for emails or phone calls going up or down a chain of command. In both of these areas, and in many others, the signature we look for is a path with certain temporal properties. In this paper we discuss our methodology for finding these temporal paths within large graphs.
Keywords :
digital signatures; graph theory; emails; graph analytics; graph representation; pass-the-hash attack; phone calls; signature discovery; temporal properties; unstructured data trasnforms; Complexity theory; Computer security; Computers; Contracts; Electronic mail; Laboratories; Social network services;
Conference_Titel :
Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4673-6214-6
DOI :
10.1109/ISI.2013.6578850