Score: 0

Distributed Temporal Graph Learning with Provenance for APT Detection in Supply Chains

Published: April 3, 2025 | arXiv ID: 2504.02313v1

By: Zhuoran Tan, Christos Anagnostopoulos, Jeremy Singer

Potential Business Impact:

Finds sneaky computer attacks hidden in software.

Business Areas:
Predictive Analytics Artificial Intelligence, Data and Analytics, Software

Cyber supply chain, encompassing digital asserts, software, hardware, has become an essential component of modern Information and Communications Technology (ICT) provisioning. However, the growing inter-dependencies have introduced numerous attack vectors, making supply chains a prime target for exploitation. In particular, advanced persistent threats (APTs) frequently leverage supply chain vulnerabilities (SCVs) as entry points, benefiting from their inherent stealth. Current defense strategies primarly focus on prevention through blockchain for integrity assurance or detection using plain-text source code analysis in open-source software (OSS). However, these approaches overlook scenarios where source code is unavailable and fail to address detection and defense during runtime. To bridge this gap, we propose a novel approach that integrates multi-source data, constructs a comprehensive dynamic provenance graph, and detects APT behavior in real time using temporal graph learning. Given the lack of tailored datasets in both industry and academia, we also aim to simulate a custom dataset by replaying real-world supply chain exploits with multi-source monitoring.

Country of Origin
🇬🇧 United Kingdom

Page Count
3 pages

Category
Computer Science:
Cryptography and Security