International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
The journal follows the UGC Guidelines and is evaluated for inclusion in the Web of Science
ISSN: 2583-6129

Impact Factor: 8.072

PREDICTING SUPPLY CHAIN CYBER THREAT WITH MACHINE LEARNING

Version
File Size 572.02 KB
Downloads 2
Files 1
Published 16 May 2026
Updated 16 May 2026

PREDICTING SUPPLY CHAIN CYBER THREAT WITH MACHINE LEARNING

Authors:

1st N. Pranathi, 2nd K.Siddhartha, 3rd T.Supriya, 4th B. Venkateswarlu

Geethanjali College Of Engineering and Technology, Cheeryal Department of CSE – Data Science

 

Abstract - Supply chains, with the transition into hyper-connected digital ecosystems, naturally face an increasing threat level from acts of ransomware, insiders, or stealthy data exfiltration attacks. Conventional security systems, being naturally reactive, become ineffective in matching these evolving threats. In this paper, an infrastructure for proactive cyber threats suited for supply chain scenarios has been proposed. The network monitoring system is the first of its kind that, through the use of artificial intelligence, combines Cyber Threat Intelligence (CTI) and advanced analysis based on the establishment behavior of traffic, and employs machine learning tools that will contain such things as detection of anomalies and higher-order classification to ward off the attacks by full-scale incidents. The system is bolstered by a visualization board that displays the monitoring of the system process and the automated alerts that are accordingly triggered for the immediate establishment of the situation. Ultimately, the present research strives to introduce an intelligent and scalable paradigm through which the protection against possible hacker attacks will switch from just-defense to prevention thus increasing the resilience of the organizational networks.

Keywords: Anomaly detection, machine learning, cyber supply chain security, cyber threat intelligence, cyber threat prediction, and real-time monitoring are the main words for the content.

Download
or download free
[changelog]

Categories & Tags

Similar Downloads

No related download found!
ISJEM Journal

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics....
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More