Recommender systems meeting security: From product recommendation to cyber-attack prediction

22Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have been caused. Furthermore, graphs can be used to show paths than can be exploited by attackers to intrude into systems and gain unauthorized access through vulnerability exploitation. This paper presents a method that builds attack graphs using data supplied from the maritime supply chain infrastructure. The method delivers all possible paths that can be exploited to gain access. Then, a recommendation system is utilized to make predictions about future attack steps within the network. We show that recommender systems can be used in cyber defense by predicting attacks. The goal of this paper is to identify attack paths and show how a recommendation method can be used to classify future cyber-attacks. The proposed method has been experimentally evaluated and it is shown that it is both practical and effective.

Cite

CITATION STYLE

APA

Polatidis, N., Pimenidis, E., Pavlidis, M., & Mouratidis, H. (2017). Recommender systems meeting security: From product recommendation to cyber-attack prediction. In Communications in Computer and Information Science (Vol. 744, pp. 508–519). Springer Verlag. https://doi.org/10.1007/978-3-319-65172-9_43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free