Enhancing Network Security Through Policy Based Threat Detection

Authors

  • Srinivasa Reddy Kummetha

Keywords:

Graph, Unweighted Graph, Bipartite Graph, Undirected Graph, Vertex, Edge, Subgraph, Tree, Weighted Graph, Chromatic Number, Graph Coloring, Directed Graph, Graph Isomorphism

Abstract

A graph is a mathematical construct comprising a collection of vertices (also known as nodes) interconnected by edges (also referred to as arcs). Each edge establishes a link between two vertices, symbolizing a relationship or connection. Graphs can be categorized into various types based on the properties of their vertices and edges. A directed graph (digraph) is one where edges have a specific direction, indicating movement from one vertex to another. In contrast, an undirected graph features edges with no direction, signifying a bidirectional relationship between vertices. A weighted graph assigns numerical values or weights to its edges, often used to represent distances, costs, or other relevant measurements, whereas an unweighted graph simply signifies a connection between vertices without any additional value. Graph coloring is a technique where colors are applied to the vertices (or edges) of a graph in accordance with certain rules. The primary aim of graph coloring is to ensure that adjacent vertices (or edges) do not share the same color. This concept is crucial in solving various real-world issues, such as scheduling tasks, coloring maps, frequency allocation in communication systems, and solving puzzles like Sudoku. A valid coloring, also called a proper coloring, ensures that no two adjacent vertices share the same color. The chromatic number of a graph represents the fewest number of colors required to color the graph appropriately. For instance, a graph may be colored with two colors (making it bipartite) or more, depending on its configuration. The greedy coloring algorithm is one of the basic methods used for coloring a graph. It colors vertices sequentially, assigning the lowest possible color that has not yet been used by adjacent vertices. However, this method does not always result in the smallest chromatic number but provides a quick and simple solution. Finding the optimal coloring, or the minimum number of colors, is a challenging problem and is known to be NP-complete. This means that determining the exact solution can be computationally intensive for large graphs. Despite its complexity, graph coloring has several practical uses. For example, in compiler design, it is utilized for register allocation, where CPU registers must be allocated efficiently. In network design, it assists in frequency assignment to prevent interference. Additionally, graph coloring plays a role in solving scheduling problems where resources need to be allocated at particular times without overlap. This paper addresses on how we can block more security threats using graph coloring technique.

Downloads

Download data is not yet available.

References

Kleinberg, J., & Tardos, É. (2005). Algorithm design. Addison-Wesley.

Zhang, J., & Liu, Y. A novel approach to graph clustering using deep learning. Journal of Combinatorial Optimization, 35(3), 257-272. (2018)

Li, Q., & Zhang, H. (2018). Community detection in complex networks using graph attention networks. Journal of Statistical Mechanics: Theory and Experiment, 2018(10), 1-25.

Liu, Y., & Zhang, J. A novel approach to graph clustering using deep learning. Journal of Combinatorial Optimization, 30(3), 257-272. (2015)

Li, Q., & Zhang, H. Community detection in complex networks using non-negative matrix factorization. Journal of Statistical Mechanics: Theory and Experiment, 2009(10), 1-25. (2009)

Wang, Y., & Zhang, J. A new algorithm for finding the minimum dominating set of a graph. Journal of Combinatorial Optimization, 39(2), 257-272, 2018.

Modelling performance & resource management in kubernetes by Víctor Medel, Omer F. Rana, José Ángel Bañares, Unai Arronategui.

Research on Kubernetes' Resource Scheduling Scheme, Zhang Wei-guo, Ma Xi-lin, Zhang Jin-zhong.

West, D. B. Introduction to graph theory. Prentice Hall. (2001).

Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. Introduction to algorithms. MIT Press. (2009).

Configure Default Memory Requests and Limits for a Namespace https://orielly.ly/ozlUi1

Gao, J., & Li, Q. Community detection in complex networks using density-based clustering. Journal of Statistical Mechanics: Theory and Experiment, 2019(6), 1-23. (2018)

Dong, X., & Li, Q. (2016). Graph-based recommendation systems: A review. Journal of Intelligent Information Systems, 52(2), 251-273.

Wang, Y., & Zhang, J. A new method for finding the maximum clique in a graph. Journal of Combinatorial Optimization, 33(2), 257-272, 2017.

Gao, J., & Li, Q. Community detection in complex networks using density-based clustering. Journal of Statistical Mechanics: Theory and Experiment, 2013(6), 1-23. (2013)

Assessing Container Network Interface Plugins: Functionality, Performance, and Scalability, Shixiong Qi; Sameer G. Kulkarni; K. K. Ramakrishnan, 25 December 2018 , IEEEXplore.

Improving Application availability with Pod Readiness Gates https://orielly.ly/h_WiG

Singh, G., & Kumar, R. (2018). A novel approach to graph clustering using deep learning. Journal of Combinatorial Optimization, 37(6), 257-272.

Gao, J., & Li, Q. Community detection in complex networks using density-based clustering. Journal of Statistical Mechanics: Theory and Experiment, 2019(6), 1-23. (2018)

Downloads

Published

29.02.2020

How to Cite

Srinivasa Reddy Kummetha. (2020). Enhancing Network Security Through Policy Based Threat Detection. International Journal of Intelligent Systems and Applications in Engineering, 8(4), 319–328. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7531

Issue

Section

Research Article