Department of Computer Science, Texas Southern University, Texas, USA.
International Journal of Science and Research Archive, 2025, 14(03), 346-352
Article DOI: 10.30574/ijsra.2025.14.3.0641
Received on 19 January 2025; revised on 03 March 2025; accepted on 05 March 2025
Threat detection systems form the backbone of modern enterprise cybersecurity programs, analyzing massive volumes of logs, network flows, and user activities to identify potentially malicious events. Despite continuous advances in detection techniques, these systems generate an abundance oding to alert fatigue, wasted analyst resources, and a delayed response to actual threats. This paper surveys the problem of benign positives and proposes a graph-based framework that unifies alerts, user roles, infrastructure metadata, and historical dispositions in a knowledge graph. By representing alerts and contextual entities as interconnected nodes and edges, security teams can quickly detect recurring benign patterns (e.g., routine scanning tasks, staging environment bulk transfers) and implement precise suppression rules. Experimental findings from a simulated enterprise environment indicate that this approach significantly reduces benign positives compared to conventional static filters or standalone machine learning methods. The paper closes with recommendations for integrating multi-cloud data, automated rule generation, privacy safeguards, and user-friendly interfaces that support non-expert security analysts.
Cybersecurity; Threat Detection; Benign Positives; False Positives; Security Automation; Anomaly Detection Graph-Based Modeling; Security Intelligence; Machine Learning; Security Data Visualization
Preview Article PDF
Emmanuel Joshua. Reducing benign positives in threat detection systems: A graph-based approach to contextualizing security alerts. International Journal of Science and Research Archive, 2025, 14(03), 346-352. Article DOI: https://doi.org/10.30574/ijsra.2025.14.3.0641.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0







