SlideShare a Scribd company logo
Graph Gurus 22
Guarding Against Cyber Security Threats with a
Native Parallel Graph Database
1
© 2019 TigerGraph. All Rights Reserved
Today’s Presenters
● Co-authored GSQL, TigerGraph’s query
language, and expertise in graph
solutions and algorithms
● Developed solutions for many Fortune 50
companies
● 5+ years with TigerGraph
Xinyu Chang,
Director of Customer Solutions
Victor Lee,
Head of Product Strategy
● BS in Electrical Engineering and Computer
Science from UC Berkeley, MS in Electrical
Engineering from Stanford University
● PhD in Computer Science from Kent State
University focused on graph data mining
● 15+ years in tech industry
2
© 2019 TigerGraph. All Rights Reserved
Some Housekeeping Items
● Although your phone is muted we do want to answer your questions -
submit your questions at any time using the Q&A tab in the menu
● The webinar is being recorded and will uploaded to our website shortly
(https://www.tigergraph.com/webinars-and-events/) and the URL will be
emailed you
● If you have issues with Zoom please contact the panelists via chat
3
© 2019 TigerGraph. All Rights Reserved
Some Big and Bad Cyberattacks
Yahoo Date: 2013-14 Impact: 3 billion user accounts
Marriott International Date: 2014-18 Impact: 500 million customers
eBay Date: May 2014 Impact: 145 million users compromised
Equifax Date: July 29 2017 Impact: PII of 209 million individuals
Source: https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html
4
© 2019 TigerGraph. All Rights Reserved
Ransomware Attacks Reported Yesterday
5
© 2019 TigerGraph. All Rights Reserved
Cybersecurity Statistics At-a-Glance
● 92% of malware is delivered by email.
● 56% of IT decision makers say targeted phishing attacks are their top security
threat.
● The average ransomware attack costs a company $5 million.
● It takes organizations an average of 191 days to identify data breaches.
● 69% of companies see compliance mandates driving spending.
● 88% companies spent more than $1 million on preparing for the GDPR.
● 25% of organizations have a standalone security department.
● 54% of companies experienced an industrial control system security incident
● 61% of organizations have experienced an IoT security incident
Source: https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html
6
© 2019 TigerGraph. All Rights Reserved
A Connected Data View of Cyberattacks
● Your system is a graph
● The attack is a chain of
events:
7
● A few perpetrators issue a
vast number of attacks: hubs
DDOS
Attack
© 2019 TigerGraph. All Rights Reserved
Basics of Graph-Based Cyberattack Defense
● Your system is a network of components and processes →
make a real-time graph model
● Set up monitoring and known-pattern defenses at strategic
points
● If an attack occurs, graph assists in tracing both upstream to
source and downstream to effects
● Collect historical data to feed into Machine Learning →
Develop AI models to detect future attacks
8
© 2019 TigerGraph. All Rights Reserved
Motivation - Why Native Parallel Graph?
Why use graph database to minimize cyber security problems?
1. Huge data size.
Up to terabytes of log generated per day.
2. Integrating multiple data source.
log files, infrastructure info, user info.
3. Interconnected multi-level data structure.
service-microservice, domain-subdomain, organization chart…
4. Required to do deep-link analytics
Anomaly behavior pattern matching, source tracing
5. Real-time response to minimize the loss
9
© 2019 TigerGraph. All Rights Reserved
Integrating Multiple Data Sources
System Log Cyber Security System
Service Info
User Info
Server Info
Resource Info
Organization Info
Domain-URL-IP Info
10
© 2019 TigerGraph. All Rights Reserved
A Graph View
Queries
from
Submitted
Request To
Deployed
in
Reports To
Serves
As
Has
Admin
Has IP
In Domain
Has Micro
Service
Has IP
Has
Device
Works for
Department
Outputs To
Has URL
Has
Alert
Has
Status
Has
Email
11
© 2019 TigerGraph. All Rights Reserved
Cyber Security Problems
Common Attack Pattern Classification (CAPEC)
• Engage in deceptive interactions
• Abuse existing functionality
• Manipulate data structures
• Manipulate system resources
• Inject unexpected items
• Employ probabilistic techniques
• Manipulate timing and state
• Collect and analyze information
• Subvert access control
12
© 2019 TigerGraph. All Rights Reserved
Graph Use Cases in Cyber Security
1. Match user behavior pattern
2. Trace the source of an error/alert/
problem
3. Anomaly detection
4. Graph feature extraction for machine
learning
13
© 2019 TigerGraph. All Rights Reserved
Detect Specific User Behavior Patterns
Add Mobile
Disk Event
File Move
Event
Restricted File
Remove Mobile
Disk Event
1
2
3
Restricted File
File Read
Event
Firewall Check
Missing
A user plugged in a
mobile disk, copied
the file then removed
the mobile disk
A user read from the
restricted file bypassed
the firewall check
Firewall Service
14
© 2019 TigerGraph. All Rights Reserved
Tracing the Source of an Error/Alert/Problem
File Corrupted Alert
File Read
Event
File Write
Event
Login EventWhat is the login IP of the user whose write
operation resulted in a File Corrupted Alert
for other services ?
High CPU
Usage Alert
Request Login Event
Which login IP resulted in a High CPU Usage Alert ?
15
© 2019 TigerGraph. All Rights Reserved
Detecting Anomalies
Flooding Detection
One service receives way
more requests than usual
Request
Request
Request
Request
Request
Request
Request
Footprinting Detection
One service receives a
much larger number of
different requests from the
same IP/user ID than usual
Request
Request
Request
Request
Request
Request
Request
16
© 2019 TigerGraph. All Rights Reserved
Graph Feature Extraction
# of shortest paths to
blacklisted users/IP
# of blacklisted user/IP in
1/2/3...k hops
K Nearest Neighbor
Having similar sequence of user
behavior with blacklisted users
17
© 2019 TigerGraph. All Rights Reserved
DEMO
18
Q&A
Please submit your questions via the Q&A tab in Zoom
© 2019 TigerGraph. All Rights Reserved
Additional Resources
20
Start Free at TigerGraph Cloud Today!
https://www.tigergraph.com/cloud/
Test Drive Online Demo
https://www.tigergraph.com/demo
Download the Developer Edition
https://www.tigergraph.com/download/
Guru Scripts
https://github.com/tigergraph/ecosys/tree/master/guru_scripts
Join our Developer Forum
https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users
© 2019 TigerGraph. All Rights Reserved
Coming To A City Near You
21
Let us know if you would like to help organize a Graph Gurus
Comes To You workshop in your city
https://info.tigergraph.com/graph-gurus-request
Thank You

More Related Content

What's hot (19)

PDF
Graph Gurus 23: Best Practices To Model Your Data Using A Graph Database
TigerGraph
 
PDF
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
TigerGraph
 
PDF
Graph Gurus Episode 31: GSQL Writing Best Practices Part 1
TigerGraph
 
PDF
Graph Gurus 24: How to Build Innovative Applications with TigerGraph Cloud
TigerGraph
 
PPTX
Distributed deep learning_over_spark_20_nov_2014_ver_2.8
Vijay Srinivas Agneeswaran, Ph.D
 
PDF
Graph Hardware Architecture - Enterprise graphs deserve great hardware!
TigerGraph
 
PPTX
Distributed deep learning_framework_spark_4_may_2015_ver_0.7
Vijay Srinivas Agneeswaran, Ph.D
 
PDF
Threat Detection in Surveillance Videos
Databricks
 
PDF
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Elasticsearch
 
PPTX
Tales from an ip worker in consulting and software
Greg Makowski
 
PDF
How Graph Technology is Changing AI
Databricks
 
PDF
Large-Scale Malicious Domain Detection with Spark AI
Databricks
 
PDF
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Conference
 
PDF
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
Neo4j
 
PDF
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
DataTactics
 
PDF
Scaling AI in production using PyTorch
geetachauhan
 
PDF
Building AI with Security and Privacy in mind
geetachauhan
 
PDF
Explain Yourself: Why You Get the Recommendations You Do
Databricks
 
PDF
Building Interpretable & Secure AI Systems using PyTorch
geetachauhan
 
Graph Gurus 23: Best Practices To Model Your Data Using A Graph Database
TigerGraph
 
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
TigerGraph
 
Graph Gurus Episode 31: GSQL Writing Best Practices Part 1
TigerGraph
 
Graph Gurus 24: How to Build Innovative Applications with TigerGraph Cloud
TigerGraph
 
Distributed deep learning_over_spark_20_nov_2014_ver_2.8
Vijay Srinivas Agneeswaran, Ph.D
 
Graph Hardware Architecture - Enterprise graphs deserve great hardware!
TigerGraph
 
Distributed deep learning_framework_spark_4_may_2015_ver_0.7
Vijay Srinivas Agneeswaran, Ph.D
 
Threat Detection in Surveillance Videos
Databricks
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Elasticsearch
 
Tales from an ip worker in consulting and software
Greg Makowski
 
How Graph Technology is Changing AI
Databricks
 
Large-Scale Malicious Domain Detection with Spark AI
Databricks
 
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Shift Conference
 
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
Neo4j
 
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
DataTactics
 
Scaling AI in production using PyTorch
geetachauhan
 
Building AI with Security and Privacy in mind
geetachauhan
 
Explain Yourself: Why You Get the Recommendations You Do
Databricks
 
Building Interpretable & Secure AI Systems using PyTorch
geetachauhan
 

Similar to Graph Gurus Episode 22: Cybersecurity (20)

PDF
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Amanda Morris
 
PDF
THE ESSENTIAL ELEMENT OF YOUR SECURITY
ETDAofficialRegist
 
PDF
Graph Gurus 21: Integrating Real-Time Deep-Link Graph Analytics with Spark AI
TigerGraph
 
PPTX
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Storage Switzerland
 
PPTX
Evolution security controls towards Cloud Services
Hugo Rodrigues
 
PDF
Detect & Remediate Malware & Advanced Targeted Attacks
Imperva
 
PDF
Inteligentní ochrana osobních údajů v procesu digitální transformace
MarketingArrowECS_CZ
 
PPTX
Advanced threat protection and big data
Peter Wood
 
PPTX
Lecture 8- information technology slides
Aiman Niazi
 
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
PPTX
Automation: Embracing the Future of SecOps
IBM Security
 
PPTX
Lecture 5.pptx
DuncanWachira3
 
PPTX
CASB: Securing your cloud applications
Forcepoint LLC
 
PPTX
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
IBM Security
 
PPTX
Forcepoint Corporate Presentation_Short.pptx
caesar92
 
PPTX
Empowering the Cloud Through G Suite
Bitglass
 
PPTX
Where in the world is your Corporate data?
Ashish Patel
 
PDF
ACS Talk (Melbourne) - The future of security
siswarren
 
PDF
Reducing Attack Surface in Budget Constrained Environments
Denim Group
 
PPTX
Iia 2012 Spring Conference Philly V Final
Danny Miller
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Amanda Morris
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
ETDAofficialRegist
 
Graph Gurus 21: Integrating Real-Time Deep-Link Graph Analytics with Spark AI
TigerGraph
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Storage Switzerland
 
Evolution security controls towards Cloud Services
Hugo Rodrigues
 
Detect & Remediate Malware & Advanced Targeted Attacks
Imperva
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
MarketingArrowECS_CZ
 
Advanced threat protection and big data
Peter Wood
 
Lecture 8- information technology slides
Aiman Niazi
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
Automation: Embracing the Future of SecOps
IBM Security
 
Lecture 5.pptx
DuncanWachira3
 
CASB: Securing your cloud applications
Forcepoint LLC
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
IBM Security
 
Forcepoint Corporate Presentation_Short.pptx
caesar92
 
Empowering the Cloud Through G Suite
Bitglass
 
Where in the world is your Corporate data?
Ashish Patel
 
ACS Talk (Melbourne) - The future of security
siswarren
 
Reducing Attack Surface in Budget Constrained Environments
Denim Group
 
Iia 2012 Spring Conference Philly V Final
Danny Miller
 
Ad

More from TigerGraph (20)

PDF
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
TigerGraph
 
PDF
Better Together: How Graph database enables easy data integration with Spark ...
TigerGraph
 
PDF
Building an accurate understanding of consumers based on real-world signals
TigerGraph
 
PDF
Care Intervention Assistant - Omaha Clinical Data Information System
TigerGraph
 
PDF
Correspondent Banking Networks
TigerGraph
 
PDF
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
TigerGraph
 
PDF
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
TigerGraph
 
PDF
Fraud Detection and Compliance with Graph Learning
TigerGraph
 
PDF
Fraudulent credit card cash-out detection On Graphs
TigerGraph
 
PDF
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
TigerGraph
 
PDF
Customer Experience Management
TigerGraph
 
PDF
Graph+AI for Fin. Services
TigerGraph
 
PDF
Davraz - A graph visualization and exploration software.
TigerGraph
 
PDF
Plume - A Code Property Graph Extraction and Analysis Library
TigerGraph
 
PDF
TigerGraph.js
TigerGraph
 
PDF
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
TigerGraph
 
PDF
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
TigerGraph
 
PDF
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
TigerGraph
 
PDF
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
TigerGraph
 
PDF
Recommendation Engine with In-Database Machine Learning
TigerGraph
 
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
TigerGraph
 
Better Together: How Graph database enables easy data integration with Spark ...
TigerGraph
 
Building an accurate understanding of consumers based on real-world signals
TigerGraph
 
Care Intervention Assistant - Omaha Clinical Data Information System
TigerGraph
 
Correspondent Banking Networks
TigerGraph
 
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
TigerGraph
 
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
TigerGraph
 
Fraud Detection and Compliance with Graph Learning
TigerGraph
 
Fraudulent credit card cash-out detection On Graphs
TigerGraph
 
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
TigerGraph
 
Customer Experience Management
TigerGraph
 
Graph+AI for Fin. Services
TigerGraph
 
Davraz - A graph visualization and exploration software.
TigerGraph
 
Plume - A Code Property Graph Extraction and Analysis Library
TigerGraph
 
TigerGraph.js
TigerGraph
 
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
TigerGraph
 
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
TigerGraph
 
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
TigerGraph
 
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
TigerGraph
 
Recommendation Engine with In-Database Machine Learning
TigerGraph
 
Ad

Recently uploaded (20)

PPTX
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays
 
DOCX
Q1_LE_Mathematics 8_Lesson 4_Week 4.docx
ROWELLJAYMALAPIT
 
PDF
Introduction to Data Science_Washington_
StarToon1
 
PDF
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays
 
PPTX
UVA-Ortho-PPT-Final-1.pptx Data analytics relevant to the top
chinnusindhu1
 
PPTX
things that used in cleaning of the things
drkaran1421
 
PPTX
GEN CHEM ACCURACY AND PRECISION eme.pptx
yeagere932
 
PPTX
Insurance-Analytics-Branch-Dashboard (1).pptx
trivenisapate02
 
PDF
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays
 
PDF
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays
 
PPTX
Nursing Shift Supervisor 24/7 in a week .pptx
amjadtanveer
 
PPTX
fashion industry boom.pptx an economics project
TGMPandeyji
 
PPTX
Learning Tendency Analysis of Scratch Programming Course(Entry Class) for Upp...
ryouta039
 
PPTX
UPS Case Study - Group 5 with example and implementation .pptx
yasserabdelwahab6
 
PDF
McKinsey - Global Energy Perspective 2023_11.pdf
niyudha
 
PDF
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays
 
PPTX
isaacnewton-250718125311-e7ewqeqweqwa74d99.pptx
MahmoudHalim13
 
PDF
Top Civil Engineer Canada Services111111
nengineeringfirms
 
PDF
Responsibilities of a Certified Data Engineer | IABAC
Seenivasan
 
PPTX
Data Analysis for Business - make informed decisions, optimize performance, a...
Slidescope
 
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays
 
Q1_LE_Mathematics 8_Lesson 4_Week 4.docx
ROWELLJAYMALAPIT
 
Introduction to Data Science_Washington_
StarToon1
 
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays
 
UVA-Ortho-PPT-Final-1.pptx Data analytics relevant to the top
chinnusindhu1
 
things that used in cleaning of the things
drkaran1421
 
GEN CHEM ACCURACY AND PRECISION eme.pptx
yeagere932
 
Insurance-Analytics-Branch-Dashboard (1).pptx
trivenisapate02
 
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays
 
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays
 
Nursing Shift Supervisor 24/7 in a week .pptx
amjadtanveer
 
fashion industry boom.pptx an economics project
TGMPandeyji
 
Learning Tendency Analysis of Scratch Programming Course(Entry Class) for Upp...
ryouta039
 
UPS Case Study - Group 5 with example and implementation .pptx
yasserabdelwahab6
 
McKinsey - Global Energy Perspective 2023_11.pdf
niyudha
 
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays
 
isaacnewton-250718125311-e7ewqeqweqwa74d99.pptx
MahmoudHalim13
 
Top Civil Engineer Canada Services111111
nengineeringfirms
 
Responsibilities of a Certified Data Engineer | IABAC
Seenivasan
 
Data Analysis for Business - make informed decisions, optimize performance, a...
Slidescope
 

Graph Gurus Episode 22: Cybersecurity

  • 1. Graph Gurus 22 Guarding Against Cyber Security Threats with a Native Parallel Graph Database 1
  • 2. © 2019 TigerGraph. All Rights Reserved Today’s Presenters ● Co-authored GSQL, TigerGraph’s query language, and expertise in graph solutions and algorithms ● Developed solutions for many Fortune 50 companies ● 5+ years with TigerGraph Xinyu Chang, Director of Customer Solutions Victor Lee, Head of Product Strategy ● BS in Electrical Engineering and Computer Science from UC Berkeley, MS in Electrical Engineering from Stanford University ● PhD in Computer Science from Kent State University focused on graph data mining ● 15+ years in tech industry 2
  • 3. © 2019 TigerGraph. All Rights Reserved Some Housekeeping Items ● Although your phone is muted we do want to answer your questions - submit your questions at any time using the Q&A tab in the menu ● The webinar is being recorded and will uploaded to our website shortly (https://www.tigergraph.com/webinars-and-events/) and the URL will be emailed you ● If you have issues with Zoom please contact the panelists via chat 3
  • 4. © 2019 TigerGraph. All Rights Reserved Some Big and Bad Cyberattacks Yahoo Date: 2013-14 Impact: 3 billion user accounts Marriott International Date: 2014-18 Impact: 500 million customers eBay Date: May 2014 Impact: 145 million users compromised Equifax Date: July 29 2017 Impact: PII of 209 million individuals Source: https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html 4
  • 5. © 2019 TigerGraph. All Rights Reserved Ransomware Attacks Reported Yesterday 5
  • 6. © 2019 TigerGraph. All Rights Reserved Cybersecurity Statistics At-a-Glance ● 92% of malware is delivered by email. ● 56% of IT decision makers say targeted phishing attacks are their top security threat. ● The average ransomware attack costs a company $5 million. ● It takes organizations an average of 191 days to identify data breaches. ● 69% of companies see compliance mandates driving spending. ● 88% companies spent more than $1 million on preparing for the GDPR. ● 25% of organizations have a standalone security department. ● 54% of companies experienced an industrial control system security incident ● 61% of organizations have experienced an IoT security incident Source: https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html 6
  • 7. © 2019 TigerGraph. All Rights Reserved A Connected Data View of Cyberattacks ● Your system is a graph ● The attack is a chain of events: 7 ● A few perpetrators issue a vast number of attacks: hubs DDOS Attack
  • 8. © 2019 TigerGraph. All Rights Reserved Basics of Graph-Based Cyberattack Defense ● Your system is a network of components and processes → make a real-time graph model ● Set up monitoring and known-pattern defenses at strategic points ● If an attack occurs, graph assists in tracing both upstream to source and downstream to effects ● Collect historical data to feed into Machine Learning → Develop AI models to detect future attacks 8
  • 9. © 2019 TigerGraph. All Rights Reserved Motivation - Why Native Parallel Graph? Why use graph database to minimize cyber security problems? 1. Huge data size. Up to terabytes of log generated per day. 2. Integrating multiple data source. log files, infrastructure info, user info. 3. Interconnected multi-level data structure. service-microservice, domain-subdomain, organization chart… 4. Required to do deep-link analytics Anomaly behavior pattern matching, source tracing 5. Real-time response to minimize the loss 9
  • 10. © 2019 TigerGraph. All Rights Reserved Integrating Multiple Data Sources System Log Cyber Security System Service Info User Info Server Info Resource Info Organization Info Domain-URL-IP Info 10
  • 11. © 2019 TigerGraph. All Rights Reserved A Graph View Queries from Submitted Request To Deployed in Reports To Serves As Has Admin Has IP In Domain Has Micro Service Has IP Has Device Works for Department Outputs To Has URL Has Alert Has Status Has Email 11
  • 12. © 2019 TigerGraph. All Rights Reserved Cyber Security Problems Common Attack Pattern Classification (CAPEC) • Engage in deceptive interactions • Abuse existing functionality • Manipulate data structures • Manipulate system resources • Inject unexpected items • Employ probabilistic techniques • Manipulate timing and state • Collect and analyze information • Subvert access control 12
  • 13. © 2019 TigerGraph. All Rights Reserved Graph Use Cases in Cyber Security 1. Match user behavior pattern 2. Trace the source of an error/alert/ problem 3. Anomaly detection 4. Graph feature extraction for machine learning 13
  • 14. © 2019 TigerGraph. All Rights Reserved Detect Specific User Behavior Patterns Add Mobile Disk Event File Move Event Restricted File Remove Mobile Disk Event 1 2 3 Restricted File File Read Event Firewall Check Missing A user plugged in a mobile disk, copied the file then removed the mobile disk A user read from the restricted file bypassed the firewall check Firewall Service 14
  • 15. © 2019 TigerGraph. All Rights Reserved Tracing the Source of an Error/Alert/Problem File Corrupted Alert File Read Event File Write Event Login EventWhat is the login IP of the user whose write operation resulted in a File Corrupted Alert for other services ? High CPU Usage Alert Request Login Event Which login IP resulted in a High CPU Usage Alert ? 15
  • 16. © 2019 TigerGraph. All Rights Reserved Detecting Anomalies Flooding Detection One service receives way more requests than usual Request Request Request Request Request Request Request Footprinting Detection One service receives a much larger number of different requests from the same IP/user ID than usual Request Request Request Request Request Request Request 16
  • 17. © 2019 TigerGraph. All Rights Reserved Graph Feature Extraction # of shortest paths to blacklisted users/IP # of blacklisted user/IP in 1/2/3...k hops K Nearest Neighbor Having similar sequence of user behavior with blacklisted users 17
  • 18. © 2019 TigerGraph. All Rights Reserved DEMO 18
  • 19. Q&A Please submit your questions via the Q&A tab in Zoom
  • 20. © 2019 TigerGraph. All Rights Reserved Additional Resources 20 Start Free at TigerGraph Cloud Today! https://www.tigergraph.com/cloud/ Test Drive Online Demo https://www.tigergraph.com/demo Download the Developer Edition https://www.tigergraph.com/download/ Guru Scripts https://github.com/tigergraph/ecosys/tree/master/guru_scripts Join our Developer Forum https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users
  • 21. © 2019 TigerGraph. All Rights Reserved Coming To A City Near You 21 Let us know if you would like to help organize a Graph Gurus Comes To You workshop in your city https://info.tigergraph.com/graph-gurus-request