From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks

04/26/2018
by   Nikolaos Polatidis, et al.
0

Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have been caused. Furthermore, graphs can be used to show paths than can be exploited by attackers to intrude into systems and gain unauthorized access through vulnerability exploitation. This paper presents a method that builds attack graphs using data supplied from the maritime supply chain infrastructure. The method delivers all possible paths that can be exploited to gain access. Then, a recommendation system is utilized to make predictions about future attack steps within the network. We show that recommender systems can be used in cyber defense by predicting attacks. The goal of this paper is to identify attack paths and show how a recommendation method can be used to classify future cyber-attacks in terms of risk management. The proposed method has been experimentally evaluated and validated, with the results showing that it is both practical and effective.

READ FULL TEXT
06/21/2022

Identification of Attack Paths Using Kill Chain and Attack Graphs

The ever-evolving capabilities of cyber attackers force security adminis...
02/01/2022

Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)

The increasing critical dependencies on Internetof-Things (IoT) have rai...
12/06/2021

Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense Vulnerability

Academia, homeland security, defense, and media have accepted the percep...
01/29/2021

EphemeriShield – defence against cyber-antisatellite weapons

Satellites, are both crucial and, despite common misbelieve, very fragil...
09/17/2019

Network entity characterization and attack prediction

The devastating effects of cyber-attacks, highlight the need for novel a...
09/25/2020

Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires

Rapidly-changing cloud environments that consist of heavily interconnect...
07/16/2020

Revisiting Strategic Cyberwar Theory Reaching Decisive Strategic Outcome

Each strategy has a foundation, an overarching way of explaining why thi...