Enhancing Network Security and Privacy Using Graph-Theoretic Characteristics