1. Real Life Examples of
Graph Cybersecurity
Gal Bello
Field Engineer, Neo4j
2. Agenda
❏ Hello!
❏ Cyber Security
❏ The Problem, Solution
❏ Numbers
❏ Graph Data Model for CS
❏ Real Life Example
❏ Q&A
❏ Goodbye!
2
3. 01
Gal Bello
Neo4j Field Engineer, Israel
@gal_bello
Linkedin.com/in/galbello/
3
What’s the thing you like most about Neo4j?
“Neo4j is not just only one of the most innovative companies around the globe, it also leads a
positive cultural approach to its employees, customers, partners and community members:
Diversity & inclusion, open minded, acceptance & positiveness assumption.”
6. “Cybersecurity is the practice of defending
computers, servers, mobile devices,
electronic systems, networks, and data from
malicious attacks.”
What is Cybersecurity?
Cyber
Security
Cyber
Security
21. Law
Enforcement
Use Case:
Information and Data
Synchronization in
Law Enforcement
Law Enforcement Agencies use
Neo4j to model the information
into graphs to improve efficiency
and make direct and implicit
patterns readily apparent in real
time.
A suspect often appears in several
different databases
Financial records
Convictions
Adresses
Vehicles
Traffic cameras
Arrests
Police Reports
Appears_in
Has
H
a
s
H
a
s
Owns Registered
SUSPECT
Has
22. 01
ACCOUNT
HOLDER 2
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
ADDRESS
PHONE
NUMBER
PHONE
NUMBER
SSN 2
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
Banking
Use Case:
Modeling Fraud
Rings as Graphs
Organizing a fraud ring in the real
world is relatively simple. A group of
people share their personal
information to create synthetic
identities. For example with just 2
individuals sharing names and social
security numbers can create 4
different identities. This can be
discovered with connected analysis.
23. 01
01
Government
• Better Services
• More Consistency
• Saves Time
• Coordinates Efforts
MARRIED_TO
L
I
V
E
S
_
A
T
LIVES_AT
FATHER_OF
ENROLLED_IN
OWNS
OWNS
ID#
PHONE
EMAIL
H
A
S
HAS
HAS
MOTHER_OF
ID#
PHONE
EMAIL
27. 01
Employee A
Employee B
Employee C
Employee D
Employee Z
DEPARTMENT 100
BANK
ACCOUNT ADDRESS
PROJECT A PROJECT B
PROJECT C
DEPARTMENT 200 DEPARTMENT 300
29. 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account Address
Project C
Documents
Documents
PRODUCTION
SERVERS
30. 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account
Address
Project C
Documents
Documents
PRODUCTION
SERVERS
:PUBLISHED_ON
:SAVED_ON
:WORKS_AT
:MANAGES
31. Cybersecurity
01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account
Address
Project C
Documents
Documents
PRODUCTION
SERVERS
:PUBLISHED_ON
:SAVED_ON
:WORKS_AT
:MANAGES
PHISHING
EMAILS
Hacker
32. 01
Employee Z
HACKER
PROJECT A
DEPARTMENT 22
BANK
ACCOUNT
ADDRESS
DOCUMENTS
PRODUCTION
SERVERS
Cybersecurity
PHISHING
EMAIL
PHISHING
EMAIL
PUBLISHED ON
Employee A
Employee B
Employee C
DEPARTMENT 4
PROJECT B PROJECT C