Fig. 8From: Graph database-based network security situation awareness data storage methodThe external attack query results. The query results after we perform query command: MATCH r = (n name: “192.168.5.8’’) - [:LESTENING ON] - (p1: Port) - [:CONNECTS TO] - (p2: Port) - [:LESTENING ON] - (m: IP) RETURN r LIMIT 100. We can see that other IP addresses are connected to port 25 which is open for Simple Mail Transfer Protocol (SMTP) for sending emailBack to article page