2021
DOI: 10.1109/access.2021.3087109
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security

Abstract: Cyber Supply Chain(CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system can be exploited at any point within the supply chain. This can cause a severe disruption on the overall business continuity. Therefore, it is paramount important to understand and predicate the threats so that organization can undertake necessary control measures for the supply chain security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 54 publications
(25 citation statements)
references
References 22 publications
0
25
0
Order By: Relevance
“…A Cyber Supply Chain Compromise attack is the manipulation of products delivery mechanisms prior to receipt by a final consumer [17]. First, we model cyberattack ontology concepts CSC using concepts such as goal, actor, attack, TTP, and requirements [21] using semantic rules for logical representation or the CSC system security. Secondly, we model a cyberattack ontology for semantic mapping and knowledge representation.…”
Section: Methodsmentioning
confidence: 99%
“…A Cyber Supply Chain Compromise attack is the manipulation of products delivery mechanisms prior to receipt by a final consumer [17]. First, we model cyberattack ontology concepts CSC using concepts such as goal, actor, attack, TTP, and requirements [21] using semantic rules for logical representation or the CSC system security. Secondly, we model a cyberattack ontology for semantic mapping and knowledge representation.…”
Section: Methodsmentioning
confidence: 99%
“…The results from the feature distribution show that the cyber digital systems are prone to ransomware and malware attacks if there are no antivirus updates on the system. Furthermore, a 10-Fold cross validation was used to run each algorithm ten times for best results [19], [20]. Moreover, its precisions can predict correct instances, provide a harmonic mean for precision, recall and F-score.…”
Section: Machine Learning Predictionmentioning
confidence: 99%
“…Binary classification is used to support AUC-ROC to distinguish between the probabilities of the given classes.The optimization algorithm identifies each data object's major features or class level during training and testing. Furthermore, a 10-Fold cross validation was used to run each algorithm ten times for best results[19],[20]. Moreover, its precisions can predict correct instances, provide a harmonic mean for precision, recall and F-score.…”
mentioning
confidence: 99%
“…The overall features were 64. We extracted 38 features in the primary data relevant to the attack profile [26] [27].…”
Section: Adversarial ML Attack Modellingmentioning
confidence: 99%