2021 International Conference on Computing, Computational Modelling and Applications (ICCMA) 2021
DOI: 10.1109/iccma53594.2021.00019
|View full text |Cite
|
Sign up to set email alerts
|

Cyberattack Ontology: A Knowledge Representation for Cyber Supply Chain Security

Abstract: Cyberattacks on cyber supply chain (CSC) systems and the cascading impacts have brought many challenges and different threat levels with unpredictable consequences. The embedded networks nodes have various loopholes that could be exploited by the threat actors leading to various attacks, risks, and the threat of cascading attacks on the various systems. Key factors such as lack of common ontology vocabulary and semantic interoperability of cyberattack information, inadequate conceptualized ontology learning an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 8 publications
0
1
0
Order By: Relevance
“…In [35], cyberattack ontology concepts are explored to provide semantic mapping and relationships for determining attack patterns and risks. To address growing cyber supply chain threats, the lack of threat intelligence, and issues of trust, it is essential for organizations to understand and map the security relationships in a supply chain.…”
Section: Supply Chain Attacksmentioning
confidence: 99%
“…In [35], cyberattack ontology concepts are explored to provide semantic mapping and relationships for determining attack patterns and risks. To address growing cyber supply chain threats, the lack of threat intelligence, and issues of trust, it is essential for organizations to understand and map the security relationships in a supply chain.…”
Section: Supply Chain Attacksmentioning
confidence: 99%
“…Watering hole techniques are described in [42,43]. Even less common delivery techniques, such as baiting [44,45] or supply chain compromise [46][47][48] have been deeply analysed. Please note that although not widely used until now, supply chain compromise is an increasing trend for threat actors, as we will detail later in this paper.…”
Section: Techniques and Limitationsmentioning
confidence: 99%
“…Cyber threat intelligence (CTI) has shown the potential to improve cybersecurity and the handling of cyberattacks, by facilitating informed decision-making and creating an adaptable environment for the vastly evolving threat landscape (Yeboah-Ofori et al, 2021). While CTI is currently predominantly used in reactive contexts, this research is oriented towards enhancing the proactive use of CTI for SCSC resilience (Samtani et al, 2017).…”
Section: Introductionmentioning
confidence: 99%