Neo4j
Case Studies
Leveraging Graph Technology for Enhanced Cybersecurity: A Case Study on MITRE's CyGraph
Overview
Leveraging Graph Technology for Enhanced Cybersecurity: A Case Study on MITRE's CyGraphNeo4j |
|
|
Application Infrastructure & Middleware - Data Visualization Infrastructure as a Service (IaaS) - Cloud Databases | |
Equipment & Machinery National Security & Defense | |
Product Research & Development | |
Cybersecurity Intrusion Detection Systems | |
Cybersecurity Services System Integration | |
Operational Impact
With the implementation of CyGraph, MITRE now provides services with specialized analytic and visual capabilities that are more scalable, flexible, and comprehensive. CyGraph's comprehensive knowledge base tells a much more complete story than that of basic attack graphs or mission dependency models. It includes potential attack-pattern relationships that fill in gaps between known vulnerabilities and threat indicators. A key design feature of CyGraph is its ability to leverage existing tools and data sources to populate its knowledge base. It uses various security standards and tools such as Topological Vulnerability Analysis, MITRE’s Cyber Command System, and Crown Jewels Analysis. CyGraph also has the ability to visualize unpredictable patterns, allowing users to obtain analytic results and comprehend the semantics of their environment. It is used by multiple government agencies to help them achieve their mission, with use cases including detecting malicious network activity, modeling and simulation of cyberattacks, tracking Bitcoin transactions, and navigating through CAPEC. | |