ICT Supply Chain Security Evaluation Model Based on Bayesian Attack Graph

  • Xiao Zhou Wang
  • , Sheng Hong
  • , Jun Zhang
  • , Jiacheng Wang
  • , Lin Lin
  • , Yuanjun Ji
  • , Tong Liu
  • , Zun Wang*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the fast development of technology, the importance of ICT (Information and Communication Technology) product supply chains in production and daily life is growing and becoming a bigger market. Given the differences that exist between traditional and ICT product supply chains, security issues relating to ICT product supply chains have been increasingly coming to the fore. This paper proposes an ICT supply chain security assessment model based on Bayesian attack graphs. The model begins by analyzing the ICT supply chain to identify potential vulnerabilities and establishing an attack graph. Once the attack graph model structure is constructed, Bayesian theory is applied for quantification. A quantitative evaluation index for ICT supply chain threats is established based on the difficulty of exploiting vulnerabilities and their impact level. The corresponding atomic attack probabilities are calculated and linked to the ICT supply chain's security attribute nodes in the form of conditional transition probabilities. This approach not only infers the risk probability of an attacker successfully reaching various attribute nodes but also dynamically updates the changes in risk status based on observed attack behaviors. This enables the assessment of the overall risk status of the target supply chain under different conditions.

Original languageEnglish
Title of host publicationProceedings - 2025 3rd International Conference on Mobile Internet, Cloud Computing and Information Security, MICCIS 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages407-413
Number of pages7
ISBN (Electronic)9798331535858
DOIs
StatePublished - 2025
Event3rd International Conference on Mobile Internet, Cloud Computing and Information Security, MICCIS 2025 - Dongguan, China
Duration: 11 Apr 202514 Apr 2025

Publication series

NameProceedings - 2025 3rd International Conference on Mobile Internet, Cloud Computing and Information Security, MICCIS 2025

Conference

Conference3rd International Conference on Mobile Internet, Cloud Computing and Information Security, MICCIS 2025
Country/TerritoryChina
CityDongguan
Period11/04/2514/04/25

Keywords

  • Cyberspace Security
  • Information and Communication Technology
  • Security analysis
  • Supply chain security

Fingerprint

Dive into the research topics of 'ICT Supply Chain Security Evaluation Model Based on Bayesian Attack Graph'. Together they form a unique fingerprint.

Cite this