Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems

05/06/2023
by   Mahender Kumar, et al.
0

Additive manufacturing (AM) offers numerous benefits, such as manufacturing complex and customised designs quickly and cost-effectively, reducing material waste, and enabling on-demand production. However, several security challenges are associated with AM, making it increasingly attractive to attackers ranging from individual hackers to organised criminal gangs and nation-state actors. This paper addresses the cyber risk in AM to attackers by proposing a novel semantic-based threat prioritisation system for identifying, extracting and ranking indicators of compromise (IOC). The system leverages the heterogeneous information networks (HINs) that automatically extract high-level IOCs from multi-source threat text and identifies semantic relations among the IOCs. It models IOCs with a HIN comprising different meta-paths and meta-graphs to depict semantic relations among diverse IOCs. We introduce a domain-specific recogniser that identifies IOCs in three domains: organisation-specific, regional source-specific, and regional target-specific. A threat assessment uses similarity measures based on meta-paths and meta-graphs to assess semantic relations among IOCs. It prioritises IOCs by measuring their severity based on the frequency of attacks, IOC lifetime, and exploited vulnerabilities in each domain.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/18/2023

Graph-Theoretic Approach for Manufacturing Cybersecurity Risk Modeling and Assessment

Identifying, analyzing, and evaluating cybersecurity risks are essential...
research
04/19/2021

FLAW3D: A Trojan-based Cyber Attack on the Physical Outcomes of Additive Manufacturing

Additive Manufacturing (AM) systems such as 3D printers use inexpensive ...
research
01/02/2018

A Semantic-Rich Similarity Measure in Heterogeneous Information Networks

Measuring the similarities between objects in information networks has f...
research
03/07/2021

Threat Modeling of Cyber-Physical Systems in Practice

Traditional Cyber-physical Systems(CPSs) were not built with cybersecuri...
research
12/25/2017

DMSS: A Robust Deep Meta Structure Based Similarity Measure in Heterogeneous Information Networks

Similarity measure as a fundamental task in heterogeneous information ne...
research
01/18/2023

Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures

A thorough and systematic understanding of different elements of cyberat...

Please sign up or login with your details

Forgot password? Click here to reset