WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Cybersecurity Attack Detection using Graph Theory

Sridula O S O S

Download Paper

Paper Contents

Abstract

In the face of increasingly sophisticated cyber threats, robust intrusion detection systems are essential for safeguarding digital communication networks. This paper explores the application of graph theory in detecting diverse network attacks, including Denial of Service (DoS), Distributed Denial of Service (DDoS), SSH brute force, Man-in-the-Middle (MitM), ARP spoofing, data exfiltration, and DNS tunnelling. By modelling networks as graphswhere nodes representhosts and edges denote traffic flows structural properties such as centrality, connectivity, path anomalies and subgraph patterns are leveraged to identify malicious activity. Graph-based techniques enable scalable and interpretable analysis, with BFS traversal aiding in attack path tracing, weighted edge analysis detecting abnormal traffic volumes, and clustering methods exposing botnet behaviours in DDoS attacks. The proposed approach is particularly effective for large-scale networks, including corporate LANs, ISPs, and university infrastructures, of erring real-time threat detection and proactive defence mechanisms. Integrating graph theory into cybersecurity frameworks enhances threat detection accuracy while supporting the development of resilient, self-healing networks, addressing critical challenges in modern cybersecurity.

Copyright

Copyright © 2025 Sridula O S. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS50600043932
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us