<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.1090145</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Testing, Verification and Validation</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Testi, Doğrulama ve Validasyon</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-4114-1390</contrib-id>
                                                                <name>
                                    <surname>Sülü</surname>
                                    <given-names>Mücahit</given-names>
                                </name>
                                                                    <aff>INONU UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-6113-4649</contrib-id>
                                                                <name>
                                    <surname>Daş</surname>
                                    <given-names>Resul</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20220730">
                    <day>07</day>
                    <month>30</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>10</volume>
                                        <issue>3</issue>
                                        <fpage>300</fpage>
                                        <lpage>306</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20220319">
                        <day>03</day>
                        <month>19</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20220728">
                        <day>07</day>
                        <month>28</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Threat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors. Cyber threat intelligence sources include open-source intelligence, social media intelligence, human intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic, and data derived for the deep and dark web. In this study, graph visualization is discussed for the intelligible and accurate analysis of complex cyber threat intelligence data, including network attacks. The processes of collecting, cleaning, organizing, and visualizing cyber intelligence data in different formats and contents on a single platform are given step by step. Dynamic graphs play an active role in these systems, where the attack locations and targets from different points are constantly variable. Therefore, research on dynamic graph solutions and visualization in the visual analysis of cyberattacks is presented.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>cyber security</kwd>
                                                    <kwd>  graph visualization</kwd>
                                                    <kwd>  dynamic graph</kwd>
                                                    <kwd>  cyber threat intelligence</kwd>
                                                    <kwd>  cyber attack visualization</kwd>
                                                    <kwd>  big data</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] Y. Bu ̈rhan and R. Das ̧, “Co-author link prediction from academic databases,” Gazi University, Journal of Polytechnic, vol. 20, no. 4, pp. 787–800, Dec. 2017. [Online]. Available: http://dergipark.gov.tr/ download/article- file/387477</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] L. Yang, E. Cheng, and Z. M. O ̈zsoyog ̆lu, “Efficient path-based computations on pedigree graphs with compact encodings,” BMC Bioinformatics, vol. 13, no. S3, p. S14, Dec. 2012. [Online]. Available: https://bmcbioinformatics.biomedcentral. com/articles/10.1186/1471- 2105- 13- S3- S14</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] Q. Guo, X. Qiu, X. Xue, and Z. Zhang, “Syntax-guided text generation via graph neural network,” Science China Information Sciences, vol. 64, no. 5, p. 152102, May 2021. [Online]. Available: http://link.springer.com/10.1007/s11432-019-2740-1</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] B. Xie, C. Qi, H. Ben, and W. Yu, “The applications of graph theory in electric network,” in 2019 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC). Beijing, China: IEEE, Aug. 2019, pp. 780–784. [Online]. Available: https: //ieeexplore.ieee.org/document/9168962/</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] D. P. Sinha, “A pairing between graphs and trees,” arXiv:math/0502547, Oct. 2006, arXiv: math/0502547. [Online]. Available: http://arxiv.org/ abs/math/0502547</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] S. A. M. A. Junid, N. M. Tahir, Z. A. Majid, and M. F. M. Idros, “Potential of graph theory algorithm approach for DNA sequence alignment and comparison,” in 2012 Third International Conference on Intelligent Systems Modelling and Simulation. Kota Kinabalu, Malaysia: IEEE, Feb. 2012, pp. 187–190. [Online]. Available: http://ieeexplore.ieee.org/document/6169697/</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] J. Zhao, Q. Yan, J. Li, M. Shao, Z. He, and B. Li, “TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data,” Computers &amp; Security, vol. 95, p. 101867, Aug. 2020. [Online]. Available: https://linkinghub.elsevier.com/ retrieve/pii/S0167404820301395</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] OASIS, “STIXTM version 2.0. part 3: Cyber observable core concepts.”</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] E. Rossi, B. Chamberlain, F. Frasca, D. Eynard, F. Monti, and M. Bronstein, “Temporal graph networks for deep learning on dynamic graphs,” arXiv:2006.10637 [cs, stat], Oct. 2020, arXiv: 2006.10637.
[Online]. Available: http://arxiv.org/abs/2006.10637</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] F. Harary and G. Gupta, “Dynamic graph models,” Mathematical
and Computer Modelling, vol. 25, no. 7, pp. 79–87, Apr. 1997. [Online]. Available: https://linkinghub.elsevier.com/retrieve/pii/ S0895717797000502</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] M. Krzywinski, I. Birol, S. J. Jones, and M. A. Marra, “Hive plots– rational approach to visualizing networks,” Briefings in Bioinformatics, vol. 13, no. 5, pp. 627–644, Sep. 2012. [Online]. Available: https://academic.oup.com/bib/article- lookup/doi/10.1093/bib/bbr069</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] R. Das and I. Turkoglu, “Creating meaningful data from web logs for improving the impressiveness of a website by using path analysis method,” Expert Systems with Applications, vol. 36, no. 3, Part 2, pp. 6635–6644, Apr. 2009. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0957417408005952</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] S. Noel, E. Harley, K. Tam, M. Limiero, and M. Share, “Chapter 4 - cygraph: Graph-based analytics and visualization for cybersecurity,” in Cognitive Computing: Theory and Applications, ser. Handbook of Statistics, V. N. Gudivada, V. V. Raghavan, V. Govindaraju, and C. Rao, Eds. Elsevier, 2016, vol. 35, pp. 117–167. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0169716116300426</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] “Global international migration flows | Wittgenstein Centre.” [Online]. Available: http://download.gsb.bund.de/BIB/global flow/</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15] G. Chen, “Information fusion and visualization of cyber-attack graphs,” SPIE Newsroom, 2007. [Online]. Available: http://www.spie.org/x14562. xml</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16] M. Alshammari and A. Rezgui, “An all pairs shortest path algorithm for dynamic graphs,” International Journal of Mathematics and Computer Science, p. 20, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17] J. R. Nascimento, U. S. Souza, and J. L. Szwarcfiter, “Partitioning a graph into complementary subgraphs,” Graphs and Combinatorics, vol. 37, no. 4, pp. 1311–1331, Jul. 2021. [Online]. Available: https://link.springer.com/10.1007/s00373-021-02319-4</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18] S. V. Patil and D. B. Kulkarni, “K-way spectral graph partitioning for load balancing in parallel computing,” Bharati Vidyapeeth’s Institute of Computer Applications and Management, Aug. 2021. [Online]. Available: https://link.springer.com/10.1007/s41870-021-00777-w</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19] M.Baykara,R.Das ̧,andG.Tuna,“Websunucueris ̧imku ̈tu ̈klerinden web ataklarının tespitine yo ̈nelik web tabanlı log analiz platformu,” Fırat U ̈niversitesi Mu ̈hendislik Bilimleri Dergisi, vol. 28, pp. 291 – 302, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20] “Visualized SDO relationships,” Sep. 2021. [Online]. Available: https://oasis- open.github.io/cti- documentation/examples/ visualized- sdo- relationships</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21] S. Majeed, M. Uzair, U. Qamar, and A. Farooq, “Social Network Analysis Visualization Tools: A Comparative Review,” in 2020 IEEE 23rd International Multitopic Conference (INMIC). Bahawalpur, Pakistan: IEEE, Nov. 2020, pp. 1–6. [Online]. Available: https: //ieeexplore.ieee.org/document/9318162/</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22] S. Hussain, L. Muhammad, and A. Yakubu, “Mining social media and DBpedia data using Gephi and R,” Journal of Applied Computer Science &amp; Mathematics, vol. 12, no. 1, pp. 14–20, 2018. [Online]. Available: http://www.jacsm.ro/view/?pid=25 2</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23] G. Drakopoulos, A. Baroutiadi, and V. Megalooikonomou, “Higher order graph centrality measures for Neo4j,” in 2015 6th International Confer- ence on Information, Intelligence, Systems and Applications (IISA), Jul. 2015, pp. 1–6.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24] E. Curmi, R. Fenner, K. Richards, J. M. Allwood, B. Bajzˇelj, and G. M. Kopec, “Visualising a stochastic model of californian water resources using sankey diagrams,” Water Resources Management, vol. 27, no. 8, pp. 3035–3050, Jun. 2013. [Online]. Available: http://link.springer.com/10.1007/s11269-013-0331-2</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
