GRP 1 (Graphs) No
GRP 1 (Graphs) No
FACULTY NAME:-
Dr.SUCHETA MOHARIR TOPIC-:GRAPHS
1 DEFINITION 2 PURPOSE
Graphs are mathematical structures that In cybersecurity, graphs are used to
consist of nodes (vertices) connected by model network topologies, analyze
edges (lines). network traffic patterns, detect
Notation: A graph is typically denoted anomalies or intrusions, and optimize
as G=(V,E), where: security measures. Graph algorithms
V is a set of vertices. can help identify vulnerabilities, predict
E is a set of edges, where each edge is a attack paths, and improve overall
pair of vertices. network security.
TYPES OF GRAPHS
TYPES OF GRAPHS
TYPES OF GRAPHS
BASIC TERMINOLOGY
BASIC TERMINOLOGY
BASIC TERMINOLOGY
BASIC TYPES OF
TERMINOLOGY GRAPHS
1 NULL GRAPH
1 NULL GRAPH
2 TRIVIAL GRAPH
2 TRIVIAL GRAPH
3 DIRECTED GRAPH
3 DIRECTED GRAPH
4 UNDIRECTED GRAPH
4 UNDIRECTED GRAPH
5 WEIGHTED GRAPH
5 SELF LOOP
6 COMPLETE GRAPH
6 PROPER EDGE GRAPH
7 REGULAR GRAPH
7 MULTI EDGE GRAPH
8 SIMPLE GRAPH
8 SIMPLE GRAPH
9 CYCLIC AND ACYCLIC GRAPH
9 MULTI GRAPH
10 WHEEL GRAPH
10 PSEUDO GRAPH
11 FINITE GRAPH
11 FINITE GRAPH
12 INFINITE GRAPH
12 INFINITE GRAPH
13 BIPARTITE GRAPH
13 INCIDENCE AND ADJACENCY
14 COMPLETE BIPARTITE GRAPH
14 DEGREE OF VERTEX
15 CONNECTED GRAPH
15 ISOLATED AND PENDANT VERTEX
SUBGRAPHS
Any two graphs will be known as isomorphism if they satisfy the following four conditions:
1. There will be an equal number of vertices in the given graphs.
2. There will be an equal number of edges in the given graphs.
3. There will be an equal amount of degree sequence in the given graphs.
4. If the first graph is forming a cycle of length k with the help of vertices {v1, v2, v3, …. vk}, then
another graph must also form the same cycle of the same length k with the help of vertices {v1, v2, v3,
…. vk}.
ADJACENCY
MATRIX
If an Undirected Graph G consists of n vertices
then the adjacency matrix of a graph is n x n
matrix A = [aij] and defined by -
aij = 1 {if there is a path exists from Vi to Vj}
History of Graphs
1 Early Beginnings
Graph theory has its roots dating back to the 18th century, with the famous "Bridges of
Königsberg" problem solved by Leonhard Euler in 1736.
2 Mathematical foundation
In the 19th century, mathematicians like Gustav Kirchhoff and Arthur Cayley further
developed the theoretical foundations of graph theory.
3 Modern Advancements
The 20th century saw a surge in graph theory research, driven by applications in
computer science, operations research, and social network analysis.
The properties related to a graph are listed below.
Graphs ⚬ Diameter of a graph is the maximum eccentricity from all the vertices
of the graph. It is represented as d(G).
⚬ If the eccentricity of the graph is equal to its radius then it is known as
the central point of the graph.
⚬ The set of all the central point of a graph is known as the center of the
graph
⚬ The total number of edges in the longest cycle of graph G is known as
the circumference of the graph G.
⚬ The total number of edges in the shortest cycle of graph G is known
as girth. It is represented as g(G).
WALK
Walk can be open or closed.
Open walk- A walk is said to be an open walk if the starting
and ending vertices are different i.e. the origin vertex and
terminal vertex are different.
Closed walk- A walk is said to be a closed walk if the
starting and ending vertices are identical i.e. if a walk starts
and ends at the same vertex, then it is said to be a closed
walk.
In the above diagram:
TRIAL
Trail is an open walk in
which no edge is repeated.
Vertex can be repeated.
PATH It is a trail in which neither vertices nor edges are repeated
i.e. if we traverse a graph such that we do not repeat a vertex
and nor we repeat an edge. As path is also a trail, thus it is
also an open walk.
CIRCUIT
Traversing a graph such that not an edge is repeated but
vertex can be repeated and it is closed also i.e. it is a
closed trail.
SUMMARY
EULER EULER EULER PATH
GRAPH CIRCUIT
If there is a connected graph with a circuit that has all the edges of
We can also call the Euler path as Euler walk or Euler
the graph, then that type of circuit will be known as the Euler
circuit. Trail. The definition of Euler trail and Euler walk is
If there is a connected graph, which has a walk that passes through described as follows:
each and every edge of the graph only once, then that type of walk If there is a connected graph with a trail that has all the
will be known as the Euler circuit. In this walk, the starting vertex edges of the graph, then that type of trail will be known
If all the vertices of any and ending vertex must be the same, and this walk can contain the as the Euler trail.
repeated vertex, but it is not compulsory.
connected graph have an even If there is a connected graph, which has a walk that
If an Euler trail contains the same vertex at the start and end of the
degree, then this type of graph trail, then that type of trail will be known as the Euler Circuit. passes through each and every edge of the graph only
A closed Euler trail will be known as the Euler Circuit. once, then that type of walk will be known as the Euler
will be known as the Euler
Euler circuit = ABCDFBEDA walk.
graph. Euler path = BCDFBEDAB
KRUSKAL'S
ALGORITHM Kruskal's algorithm is a greedy algorithm that finds a minimum spanning tree
for a connected weighted graph. It finds a tree of that graph which includes
every vertex and the total weight of all the edges in the tree is less than or equal
to every possible spanning tree.
Algorithm
Step 1 − Arrange all the edges of the given graph G(V,E)
in ascending order as per their edge weight.
Step 2 − Choose the smallest weighted edge from the graph and check if it
forms a cycle with the spanning tree formed so far.
Step 3 − If there is no cycle, include this edge to the spanning tree else discard
it.
Algorithm
Initialize the minimal spanning tree with a single vertex, randomly chosen from the graph.
Repeat steps 3 and 4 until all the vertices are included in the tree.
Select an edge that connects the tree with a vertex not yet in the tree, so that the weight of the
edge is minimal and inclusion of the edge does not form a cycle.
Add the selected edge and the vertex that it connects to the tree.
PRIM'S
ALGORITHM
Cybersecurity knowledge graphs Graphs can be used for cybersecurity Graphs can be used in cybersecurity to The paper discusses the use of attack
provide a holistic approach for by capturing correlations between represent cyber-knowledge, visualize graphs in cybersecurity to predict
processing complex cybersecurity data, cyber entities and modeling the networks, data flow, and attack paths, exploit paths across networks and
assisting security analysts in obtaining relationships and complex interactions and understand data correlations by identify vulnerabilities in the system.
cyberthreat intelligence, visualizing between them. aggregating and fusing data.
networks and attack paths, and
understanding data correlations
Application of Graphs
3 Optimization 4 Cryptography
Graph theory provides powerful tools for Graphs are used in cryptographic protocols and algorithms
optimizing processes, such as finding the for key exchange, authentication, and secure
communication. Graph-based encryption schemes and
shortest path or identifying the most efficient
protocols provide secure and efficient methods for
network configuration.
protecting sensitive information in digital communication
systems.
Future Trends in Graph Theory