Deep Learning Models for Predicting Cyber‑Physical Attacks in Supply Chain Networks

Authors

  • Ankush Gupta Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-9262.IJAIDSML-V7I1P125

Keywords:

Deep Learning, Cyber-Physical Security, Supply Chain Networks, Graph Convolutional Networks, Spatial-Temporal Modeling, Intrusion Prediction

Abstract

Cyber-physical supply chain networks have become increasingly vulnerable to sophisticated, multi-stage cyber threats due to the convergence of operational technology, enterprise systems, and real-time IoT infrastructures. Traditional rule-based and reactive security mechanisms are often insufficient to detect stealthy or evolving attack strategies that propagate across interconnected nodes. This study proposes a spatial-temporal deep learning framework for predictive cyber-physical attack detection in supply chain environments. The model integrates Graph Convolutional Networks to capture structural interdependencies between distributed supply chain entities and Long Short-Term Memory networks to model sequential behavioral anomalies over time. The proposed architecture generates probabilistic early-warning signals distinguishing normal operations, pre-attack anomalies, and active attack states. Experimental evaluation against conventional baselines demonstrates improved classification performance and reduced detection latency. The results highlight the effectiveness of hybrid graph-based and temporal learning approaches in shifting supply chain cybersecurity from reactive detection toward anticipatory risk modeling.

References

[1] U. Nayak, “Automated Data Governance and Compliance Monitoring using AI & Big Data,” Int. J. Innov. Res. Multidiscip. Prof. Stud. (IJIRMPS), vol. 13, no. 4, July–Aug. 2025, doi: 10.37082/IJIRMPS.v13.i4.232652.

[2] A. Gupta and S. Remella, “Privacy-Preserving Smart and Secure Contract Solutions for Digital Supply Chain Payments”, IJAIBDCMS, vol. 6, no. 4, pp. 232–240, Dec. 2025, doi: 10.63282/3050-9416.IJAIBDCMS-V6I4P127.

[3] Hasan, K., Hossain, F., Amin, A., Sutradhar, Y., Jeny, I. J., & Mahmud, S. (2025). Enhancing Proactive Cyber Defense: A Theoretical Framework for AI-Driven Predictive Cyber Threat Intelligence. Journal of Technologies Information and Communication, 5(1), 33122.

[4] A. Gupta, “Red Teaming AI Systems for Security Validation”, IJAIBDCMS, vol. 6, no. 1, pp. 116–123, Mar. 2025, doi: 10.63282/3050-9416.IJAIBDCMS-V6I1P112.

[5] S. Porter, "https://www.healthcareitnews.com," 14 01 2021. [Online]. Available: https://www.healthcareitnews.com/news/emea/pfizer-covid-19-vaccine-data-leaked-hackers.

[6] E. A. Lee, “Cyber Physical Systems: Design Challenges,” Proc. 11th IEEE Int. Symp. Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), Orlando, FL, USA, 2008, pp. 363–369.

[7] M. Radanliev, D. De Roure, R. Nicolescu, and M. Huth, “Cyber Risk in Supply Chains: A Systematic Literature Review,” Computers & Security, vol. 92, 2020, Art. no. 101746.

[8] A. Apruzzese, M. Colajanni, L. Ferretti, A. Guido, and M. Marchetti, “On the Effectiveness of Machine and Deep Learning for Cyber Security,” Proc. IEEE Int. Conf. Cyber Conflict (CyCon), 2018, pp. 371–390.

[9] A. Adadi and M. Berrada, “Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI),” IEEE Access, vol. 6, pp. 52138–52160, 2018.

[10] A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson, “Cyber Security Analysis of State Estimators in Electric Power Systems,” IEEE Trans. Smart Grid, vol. 4, no. 4, pp. 1906–1915, Dec. 2013.

Published

2026-02-06

Issue

Section

Articles

How to Cite

1.
Gupta A. Deep Learning Models for Predicting Cyber‑Physical Attacks in Supply Chain Networks. IJAIDSML [Internet]. 2026 Feb. 6 [cited 2026 Feb. 9];7(1):135-40. Available from: https://ijaidsml.org/index.php/ijaidsml/article/view/423