Detailed Information

Cited 23 time in webofscience Cited 63 time in scopus
Metadata Downloads

Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Securityopen access

Authors
Yeboah-Ofori, A[Yeboah-Ofori, Abel]Islam, S[Islam, Shareeful]Lee, SW[Lee, Sin Wee]Shamszaman, ZU[Shamszaman, Zia Ush]Muhammad, K[Muhammad, Khan]Altaf, M[Altaf, Meteb]Al-Rakhami, MS[Al-Rakhami, Mabrook S.]
Issue Date
2021
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Supply chains; Machine learning; Prediction algorithms; Cyberattack; Computer security; Classification algorithms; Support vector machines; Cyber threat intelligence; machine learning; cyber supply chain; predictive analytic; cyber security; tactic techniques procedures
Citation
IEEE ACCESS, v.9, pp.94318 - 94337
Indexed
SCIE
SCOPUS
Journal Title
IEEE ACCESS
Volume
9
Start Page
94318
End Page
94337
URI
https://scholarx.skku.edu/handle/2021.sw.skku/98380
DOI
10.1109/ACCESS.2021.3087109
ISSN
2169-3536
Abstract
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point within the supply chain. This can cause a severe disruption on the overall business continuity. Therefore, it is paramount important to understand and predicate the threats so that organization can undertake necessary control measures for the supply chain security. Cyber Threat Intelligence (CTI) provides an intelligence analysis to discover unknown to known threats using various properties including threat actor skill and motivation, Tactics, Techniques, and Procedure (TT and P), and Indicator of Compromise (IoC). This paper aims to analyse and predicate threats to improve cyber supply chain security. We have applied Cyber Threat Intelligence (CTI) with Machine Learning (ML) techniques to analyse and predict the threats based on the CTI properties. That allows to identify the inherent CSC vulnerabilities so that appropriate control actions can be undertaken for the overall cybersecurity improvement. To demonstrate the applicability of our approach, CTI data is gathered and a number of ML algorithms, i.e., Logistic Regression (LG), Support Vector Machine (SVM), Random Forest (RF), and Decision Tree (DT), are used to develop predictive analytics using the Microsoft Malware Prediction dataset. The experiment considers attack and TTP as input parameters and vulnerabilities and Indicators of compromise (IoC) as output parameters. The results relating to the prediction reveal that Spyware/Ransomware and spear phishing are the most predictable threats in CSC. We have also recommended relevant controls to tackle these threats. We advocate using CTI data for the ML predicate model for the overall CSC cyber security improvement.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Computing and Informatics > Convergence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher MUHAMMAD, KHAN photo

MUHAMMAD, KHAN
Computing and Informatics (Convergence)
Read more

Altmetrics

Total Views & Downloads

BROWSE