Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks

  • Original Paper
  • Published:
Evolving Systems Aims and scope Submit manuscript

Abstract

Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have been caused. Furthermore, graphs can be used to show paths than can be exploited by attackers to intrude into systems and gain unauthorized access through vulnerability exploitation. This paper presents a method that builds attack graphs using data supplied from the maritime supply chain infrastructure. The method delivers all possible paths that can be exploited to gain access. Then, a recommendation system is utilized to make predictions about future attack steps within the network. We show that recommender systems can be used in cyber defense by predicting attacks. The goal of this paper is to identify attack paths and show how a recommendation method can be used to classify future cyber-attacks in terms of risk management. The proposed method has been experimentally evaluated and validated, with the results showing that it is both practical and effective.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

Download references

Acknowledgements

This work has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement 653212.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikolaos Polatidis.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A Evaluation criteria

Appendix A Evaluation criteria

  1. 1.

    Attack path analysis

  • This describes the capacity of the evaluated method to identify and analyses different attack paths. We are distinguishing the following main types.

  1. 2.

    Vulnerability chain analysis

  • This describes the capacity of the methods to identify chains of sequential vulnerabilities on different assets and include them into the risk analysis. We are distinguishing the following main types.

  1. 3.

    Integration of open source information

  • This describes the capacity of the evaluated method to retrieve and integrated information coming from openly accessible sources of information (e.g., open source databases).

  1. 4.

    Integration of crowd sourcing information

  • This describes the capacity of the evaluated method to retrieve and integrated information coming from crowd sourcing (e.g., technical forums).

  1. 5.

    Collaboration capabilities

  • This describes the capacity of the evaluated method to enable and utilize the collaboration of several users in the risk analysis or risk management process.

  1. 6.

    Supporting tool

  • If there is a tool for providing a visual representation or any other relevant form of the results.

  1. 7.

    Tool availability

  • If the tool is available to the public to download, use or modify.

  1. 8.

    Pruning of paths

  • Pruning of paths makes algorithm more efficient. The algorithm can cut paths that either not important or fall in a category that we are not interested in, such as networked attacks.

  1. 9.

    Propagation length

  • The propagation length can be specified. The user should be able to enter the length that a potential attacker could reach after gaining access to an entry asset.

  1. 10.

    Attacker location

  • The location of the attacker can be specified. The location of the attacker can be specified, and it should be either local or networked.

  1. 11.

    Attacker capability

  • The capability of the attacker can be specified. The capability should be specified in terms of high, medium, low or similar.

  1. 12.

    Entry points

  • The entry assets can be specified, which helps to search on specific network parts for problems.

  1. 13.

    Target points

  • The target assets can be specified, which helps to search on specific network parts for problems.

  1. 14.

    Satisfaction of EU policies

  • EU maritime supply chain policies are satisfied.

  1. 15.

    Can be used for risk assessment

  • This describes the applicability of the evaluated method for the maritime supply chain risk assessment area.

  1. 16.

    Vulnerability types

  • The types and the categories of the vulnerabilities can be specified within the settings of the algorithm.

  1. 17.

    Clarity and replication

  • The algorithm is presented in a manner that it makes it easy to replicate or extend.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Polatidis, N., Pimenidis, E., Pavlidis, M. et al. From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. Evolving Systems 11, 479–490 (2020). https://doi.org/10.1007/s12530-018-9234-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12530-018-9234-z

Keywords

Navigation