Recommender systems meeting security: from product recommendation to cyber-attack prediction

Nikolaos Polatidis, Elias Pimenidis, Michalis Pavlidis, Haralambos Mouratidis

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

Abstract

Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have been caused. Furthermore, graphs can be used to show paths than can be exploited by attackers to intrude into systems and gain unauthorized access through vulnerability exploitation. This paper presents a method that builds attack graphs using data supplied from the maritime supply chain infrastructure. The method delivers all possible paths that can be exploited to gain access. Then, a recommendation system is utilized to make predictions about future attack steps within the network. We show that recommender systems can be used in cyber defense by predicting attacks. The goal of this paper is to identify attack paths and show how a recommendation method can be used to classify future cyber-attacks. The proposed method has been experimentally evaluated and it is shown that it is both practical and effective.
Original languageEnglish
Title of host publicationInternational Conference on Engineering Applications of Neural Networks
Place of PublicationGermany
PublisherSpringer
Pages508-519
Number of pages12
ISBN (Print)9783319651729
DOIs
Publication statusPublished - 2 Aug 2017
EventInternational Conference on Engineering Applications of Neural Networks - Athens, Greece, 25-27 August, 2017
Duration: 2 Aug 2017 → …

Publication series

NameCommunications in Computer and Information Science

Conference

ConferenceInternational Conference on Engineering Applications of Neural Networks
Period2/08/17 → …

Bibliographical note

The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-65172-9_43

Keywords

  • Recommender systems
  • Cyber security
  • Attack graph
  • Exploit
  • Vulnerability
  • Attack prediction
  • Classification

Fingerprint

Dive into the research topics of 'Recommender systems meeting security: from product recommendation to cyber-attack prediction'. Together they form a unique fingerprint.

Cite this