CFP last date
20 October 2025
Call for Paper
November Edition
IJCA solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 20 October 2025

Submit your paper
Know more
Random Articles
Reseach Article

Graph-Theoretic Approaches to Resilience: Strengthening Al Systems Against Coordinated Cyberattacks

by Tahani Almutairi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 39
Year of Publication: 2025
Authors: Tahani Almutairi
10.5120/ijca2025925679

Tahani Almutairi . Graph-Theoretic Approaches to Resilience: Strengthening Al Systems Against Coordinated Cyberattacks. International Journal of Computer Applications. 187, 39 ( Sep 2025), 1-12. DOI=10.5120/ijca2025925679

@article{ 10.5120/ijca2025925679,
author = { Tahani Almutairi },
title = { Graph-Theoretic Approaches to Resilience: Strengthening Al Systems Against Coordinated Cyberattacks },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2025 },
volume = { 187 },
number = { 39 },
month = { Sep },
year = { 2025 },
issn = { 0975-8887 },
pages = { 1-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number39/graph-theoretic-approaches-to-resilience-strengthening-al-systems-against-coordinated-cyberattacks/ },
doi = { 10.5120/ijca2025925679 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-09-23T00:36:43.188786+05:30
%A Tahani Almutairi
%T Graph-Theoretic Approaches to Resilience: Strengthening Al Systems Against Coordinated Cyberattacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 39
%P 1-12
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This study proposes a multilayered graph-theoretic framework to improve the resilience of interconnected infrastructure, such as IoT infrastructure, autonomous vehicles, and smart cities, against cyber threats. By harnessing Artificial Intelligence techniques with graph-theoretic models, a solution enables real-time adaptation to changes in attack patterns. Based on the seminal work of Pirani and Mitra, adaptive algorithms optimize the response of the system to a cyber threat as these threats evolve. Using real-time traffic data with four years of archive data from San Francisco Bay Area Traffic Sensors, the model was validated against various cyber-attacks by simulation, changing metrics used for evaluation, namely the attack impact score, vulnerability index, resilience score, and adaptability. The results indicated a large improvement in resilience, with the attack impact being reduced to 0.10 from 0.70, the vulnerability index dropping from 0.85 to 0.30, and the resilience index increasing from 0.60 to 0.90 after implementing real-time adjustments. The adaptability metric changed from low to high after optimization and adjustment in the real-time phases. These results show that an AI and graph-theoretic paradigm, such as this, has advantages over classical methods and provides a scalable solution for strengthening critical infrastructure while assuring real-time mitigation plans for safeguarding interconnected systems.

References
  1. K. C. Chaganti, ”A Scalable, Lightweight AI-Driven Security Framework for IoT Ecosystems: Optimization and Game Theory Approaches,” IEEE Access, vol. 13, pp. 1–1, 2025. DOI: 10.1109/ACCESS.2025.3558623.
  2. K. C. Chaganti, S. R. Inta, S. L. Bandla, and R. Chilukuri, ”Cyber Threats in the Pharmaceutical Industry: A Deep Dive into Recent Attacks and Future Implications,” IEEE Access, vol. 13, pp. 1–1, 2025. DOI: 10.1109/ACCESS.2025.3583667.
  3. X. Zhang, ”Detection and Resilience Mechanisms Against Cyber-attacks in Connected Automated Vehicle Platoons,” IEEE Access, vol. 9, pp. 12345–12356, 2021.
  4. X. Koutsoukos, ”Science of Secure and Resilient Cyber-Physical Systems,” DTIC Technical Report, AD1092617, 2021.
  5. M. A. Haque, ”Cyber Resilience Analytics for Cyber-Physical Systems,” Ph.D. dissertation, Old Dominion University, 2021.
  6. V. Venkataramanan and A. Hahn, ”CP-SAM: Cyber-physical Security Assessment Metric for Monitoring Microgrid Resiliency,” IEEE Transactions on Industrial Informatics, vol. 16, pp. 2347–2356, 2020.
  7. M. J. F. Alenazi, ”ResiSC: A System for Building Resilient Smart City Communication Networks,” Engineering Applications of Artificial Intelligence, vol. 98, pp. 106–117, 2021.
  8. R. Pal and R. X. Sequeira, ”Optimizing Cyber-Resilience in Critical Infrastructure Networks,” IEEE Transactions on Smart Grid, vol. 12, pp. 2456–2465, 2021.
  9. M. Pirani and A. Mitra, ”Graph-theoretic Approaches for Analyzing the Resilience of Distributed Control Systems,” Computers & Electrical Engineering, vol. 90, pp. 106–119, 2021.
  10. S. R. Fahim, R. Atat, and C. Kececi, ”Graph Autoencoder-based Power Attacks Detection for Resilient Electrified Transportation Systems,” IEEE Transactions on Industrial Electronics, vol. 68, pp. 234–246, 2021.
  11. A. Eliseev, H. Stenglein, and F. Steinke, ”Minimizing Worst-Case Cyber Graph Reconfigurations in Resilient Cyber-Physical Systems,” IEEE Transactions on Cybernetics, vol. 50, pp. 1234–1245, 2020.
  12. A. R. Kosle, ”Reducing Alert Fatigue in SOC Teams Through Contextual Prioritization and Threat Intelligence Integration,” OSF Preprints, 2025.
  13. M. A. Taher, M. Tariq, and A. I. Sarwat, ”Enhancing Security in Islanded AC Microgrid: Detecting and Mitigating Cyber Attacks in Secondary Control through AI-Based Methods,” IEEE Transactions on Industry Applications, vol. 60, pp. 1–10, 2024.
  14. M. Doostmohammadian and M. Pirani, ”On the Design of Resilient Distributed Single Time-Scale Estimators: A Graph-Theoretic Approach,” IEEE Transactions on Cybernetics, vol. 55, pp. 456–470, 2025.
  15. S. Nie, X. Zhu, F. Xiong, and N. Zhang, ”Network Learning and Propagation Dynamics Analysis,” Frontiers in Physics, 2025.
  16. G. Wen, Y. Lv, D. Zhao, and X. Lei, Distributed Security Monitoring and Resilient Cooperative Control. Springer, 2024.
Index Terms

Computer Science
Information Sciences

Keywords

Artificial Intelligence (AI) graph-theoretic framework resilience cyber-attacks Internet of Things (IoT) autonomous vehicles smart cities vulnerability index attack impact adaptability