Cyber-attack path discovery in a dynamic supply chain maritime risk management system

Nikolaos Polatidis, Michalis Pavlidis, Haralambos Mouratidis

    Research output: Contribution to journalArticlepeer-review


    Maritime port infrastructures rely on the use of information systems for collaboration, while a vital part of collaborating is to provide protection to these systems. Attack graph analysis and risk assessment provide information that can be used to protect the assets of a network from cyber-attacks. Furthermore, attack graphs provide functionality that can be used to identify vulnerabilities in a network and how these can be exploited by potential attackers. Existing attack graph generation methods are inadequate in satisfying certain requirements necessary in a dynamic supply chain risk management environment, since they do not consider variables that assist in exploring specific network parts that satisfy certain criteria, such as the entry and target points, the propagation length and the location and capability of the potential attacker. In this paper, we present a cyber-attack path discovery method that is used as a component of a maritime risk management system. The method uses constraints and Depth-first search to effectively generate attack graphs that the administrator is interested in. To support our method and to show its effectiveness we have evaluated it using real data from a maritime supply chain.
    Original languageEnglish
    Pages (from-to)74-82
    Number of pages9
    JournalComputer Standards & Interfaces
    Publication statusPublished - 14 Sept 2017

    Bibliographical note

    Open access under a Creative Commons license Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)


    • Cyber-security
    • Attack path discovery
    • Risk management system
    • Maritime supply chain
    • ISO standards
    • NIST SP 800-30


    Dive into the research topics of 'Cyber-attack path discovery in a dynamic supply chain maritime risk management system'. Together they form a unique fingerprint.

    Cite this