Conference paper Open Access

Cyber Supply Chain Threat Analysis and Prediction using Machine Learning and Ontology

Abel Yeboah-Ofori; Haralambos Mouratidis; Umar Ismail; Shareeful Islam; Spyridon Papastergiou

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="DOI">10.5281/zenodo.5060199</identifier>
      <creatorName>Abel Yeboah-Ofori</creatorName>
      <creatorName>Haralambos Mouratidis</creatorName>
      <creatorName>Umar Ismail</creatorName>
      <creatorName>Shareeful Islam</creatorName>
      <creatorName>Spyridon Papastergiou</creatorName>
    <title>Cyber Supply Chain Threat Analysis and Prediction using Machine Learning and Ontology</title>
    <subject>Cyber Security, Ontology, Cyber Supply Chain, Machine Learning, Threat Prediction, Cyber Threat Intelligence</subject>
    <date dateType="Issued">2021-06-25</date>
  <resourceType resourceTypeGeneral="ConferencePaper"/>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.5060198</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf"></relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;Cyber Supply Chain (CSC) security requires a secure integrated network among the sub-systems of the inbound and outbound chains. Adversaries are deploying various penetration and manipulation attacks on an CSC integrated network&amp;rsquo;s node. The different levels of integrations and inherent system complexities pose potential vulnerabilities and attacks that may cascade to other parts of the supply chain system. Thus, it has become imperative to implement systematic threats analyses and predication within the CSC domain to improve the overall security posture. This paper presents a unique approach that advances the current state of the art on CSC threat analysis and prediction by combining work from three areas: Cyber Threat Intelligence (CTI ), Ontologies, and Machine Learning (ML). The outcome of our work shows that the conceptualization of cybersecurity using ontological theory provides clear mechanisms for understanding the correlation between the CSC security domain and enables the mapping of the ML prediction with 80% accuracy of potential cyberattacks and possible countermeasures.&lt;/p&gt;</description>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/100010661</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/952690/">952690</awardNumber>
      <awardTitle>Certifying the Security and Resilience of Supply Chain Services</awardTitle>
All versions This version
Views 200200
Downloads 134134
Data volume 66.1 MB66.1 MB
Unique views 176176
Unique downloads 125125


Cite as