2021
DOI: 10.1007/978-3-030-79150-6_41
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology

Abstract: Cyber Supply Chain (CSC) security requires a secure integrated network among the sub-systems of the inbound and outbound chains. Adversaries are deploying various penetration and manipulation attacks on an CSC integrated network's node. The different levels of integrations and inherent system complexities pose potential vulnerabilities and attacks that may cascade to other parts of the supply chain system. Thus, it has become imperative to implement systematic threats analyses and predication within the CSC do… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 8 publications
(18 reference statements)
0
8
0
Order By: Relevance
“…Common risks are data breaches and corporate fraud originating from ransomware attacks and malware infections [8]. A solution to these issues is the use of tools that promptly identify and provide alerts about malicious activity in a supply chain infrastructure and, subsequently, limit the impact of the attack [9]. Such type of tools are the intrusion detection systems (IDSs) [10][11][12] and the intrusion prevention systems (IPSs) [13,14].…”
Section: Supply Chain and Cybersecuritymentioning
confidence: 99%
“…Common risks are data breaches and corporate fraud originating from ransomware attacks and malware infections [8]. A solution to these issues is the use of tools that promptly identify and provide alerts about malicious activity in a supply chain infrastructure and, subsequently, limit the impact of the attack [9]. Such type of tools are the intrusion detection systems (IDSs) [10][11][12] and the intrusion prevention systems (IPSs) [13,14].…”
Section: Supply Chain and Cybersecuritymentioning
confidence: 99%
“…Biggio et al 2011 explore adversarial data manipulations using SVM classification algorithm under adversarial label noise by subverting the SVM learning process [20]. Chen et al 2017 designed a randomizing SVM model by using robust SVMs Gaussian distribution against method for adversarial attacks [26]. Munoz-Gonzalez et al 2017 proposed a novel poisoning algorithm based on a back-gradient optimization and used neural networks algorithms and deep learning architectures techniques to learn the dataset.…”
Section: Bmentioning
confidence: 99%
“…The overall features were 64. We extracted 38 features in the primary data relevant to the attack profile [26] [27].…”
Section: Adversarial ML Attack Modellingmentioning
confidence: 99%
“…Cyberattack ontology from the CSC perspective describes organizational security concepts, properties relationships and their interdependencies in a formal and structured approach for analysis and intelligence gatherings. [7] [15]. The goal of the cyberattack ontology is to extract relevant attack instances and information from data to ensure consistency and accuracy in the CSC system security concepts and for knowledge reuse in the threat intelligence domain.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, due to the varying organizational goals and dynamic requirements, various integrations, varying business processes, and delivery mechanisms, predicting cyberattacks in CSC from an organizational perspective has been challenging. To address these challenges, we consider the CSC cyberattack modelling approach using ontology concepts for knowledge representation and reuse within the CSC domain [15] [16] as shown in Figure 1.…”
Section: A the Rationale For Implementing Cyberattackmentioning
confidence: 99%