Abstract

This paper discusses the rationale behind applying state-of-the-art graph databases as one of the innovative ways of enhancing the artificial intelligence-powered cybersecurity of e-commerce service. Firstly, the graph theory and graph databases are introduced. Then, the paper argues why graph databases are a good fit for cybersecurity experts’ tasks and what the advantages of applying graph databases in cybersecurity are. Then, a number of available, existing tools which combine the graph database technology and cybersecurity are shown. The main contribution of the paper is a real-life scenario which has been presented of a tool designed by the authors, which employs the graph database technology and e-commerce cybersecurity, with the conclusions given thereafter.

Recommended Citation

Pawlicki, M., Pawlicka, A., Kozik, R., & Choraś, M. (2022). Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation. In R. A. Buchmann, G. C. Silaghi, D. Bufnea, V. Niculescu, G. Czibula, C. Barry, M. Lang, H. Linger, & C. Schneider (Eds.), Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings). Cluj-Napoca, Romania: Risoprint. ISBN: 978-973-53-2917-4. https://doi.org/10.62036/ISD.2022.20

Paper Type

Full Paper

DOI

10.62036/ISD.2022.20

Share

COinS
 

Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation

This paper discusses the rationale behind applying state-of-the-art graph databases as one of the innovative ways of enhancing the artificial intelligence-powered cybersecurity of e-commerce service. Firstly, the graph theory and graph databases are introduced. Then, the paper argues why graph databases are a good fit for cybersecurity experts’ tasks and what the advantages of applying graph databases in cybersecurity are. Then, a number of available, existing tools which combine the graph database technology and cybersecurity are shown. The main contribution of the paper is a real-life scenario which has been presented of a tool designed by the authors, which employs the graph database technology and e-commerce cybersecurity, with the conclusions given thereafter.