{"id":"https://openalex.org/W4408325617","doi":"https://doi.org/10.1109/aiccsa63423.2024.10912537","title":"Identification Management for Zero Trust Through Network Analysis","display_name":"Identification Management for Zero Trust Through Network Analysis","publication_year":2024,"publication_date":"2024-10-22","ids":{"openalex":"https://openalex.org/W4408325617","doi":"https://doi.org/10.1109/aiccsa63423.2024.10912537"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa63423.2024.10912537","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa63423.2024.10912537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103923936","display_name":"Amal Alshehri","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amal Alshehri","raw_affiliation_strings":["University of North Texas,Department of Computer Science &#x0026; Engineering"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science &#x0026; Engineering","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073993990","display_name":"Burak T\u00fcfek\u00e7i","orcid":"https://orcid.org/0000-0001-6266-5081"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Burak Tufekci","raw_affiliation_strings":["University of North Texas,Department of Computer Science &#x0026; Engineering"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science &#x0026; Engineering","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007796269","display_name":"Cihan Tunc","orcid":"https://orcid.org/0000-0001-5200-1097"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cihan Tunc","raw_affiliation_strings":["University of North Texas,Department of Computer Science &#x0026; Engineering"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science &#x0026; Engineering","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103923936"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45199114,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.8747000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.8747000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.8727999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.8511999845504761,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6692746877670288},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.542489767074585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5269680023193359},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.07345083355903625}],"concepts":[{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6692746877670288},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.542489767074585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5269680023193359},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.07345083355903625},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa63423.2024.10912537","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa63423.2024.10912537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2172189177","https://openalex.org/W2261059368","https://openalex.org/W2510913895","https://openalex.org/W2625325128","https://openalex.org/W2891761450","https://openalex.org/W2906768574","https://openalex.org/W2911505293","https://openalex.org/W3023211159","https://openalex.org/W3126610160","https://openalex.org/W3148181069","https://openalex.org/W3188101068","https://openalex.org/W4282945617","https://openalex.org/W4312326151","https://openalex.org/W4317743536","https://openalex.org/W4387831783","https://openalex.org/W4393973155"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Internet":[0],"of":[1,12,23,57,137],"Things":[2],"(IoT)":[3],"and":[4,30,123,135,167,177,188,213,226,239,254],"Operational":[5],"Technology":[6],"(OT)":[7],"are":[8,211,250],"becoming":[9],"essential":[10],"parts":[11],"next-generation":[13],"smart":[14],"environments,":[15],"including":[16],"Industry":[17],"4.0":[18],"thanks":[19],"to":[20,68,87,218,252],"their":[21],"capabilities":[22],"monitoring":[24,122],"and/or":[25],"controlling":[26],"industrial":[27],"devices,":[28,43],"processes,":[29],"events.":[31],"It":[32],"is":[33,55,82,93],"expected":[34],"that":[35,162,259],"there":[36],"will":[37],"be":[38,146],"around":[39],"75":[40],"billion":[41],"such":[42,204],"especially":[44,61],"considering":[45],"5G":[46],"(and":[47],"6G":[48],"in":[49,100,148,215,229],"the":[50,58,76,105,125,133,138,149,164,171,183,190,196,246,261,266],"future)":[51],"networking.":[52],"However,":[53],"security":[54,70,89,136],"one":[56],"major":[59,143],"concerns,":[60],"because":[62,141],"most":[63],"legacy":[64],"devices/equipment":[65],"have":[66],"little":[67],"no":[69,142],"measures":[71],"applied.":[72],"And,":[73],"replacing":[74],"all":[75],"equipment":[77],"with":[78,170],"new":[79],"ones":[80],"continuously":[81,121],"not":[83],"a":[84,241,256],"feasible":[85],"solution":[86],"enforce":[88],"measures.":[90],"One":[91],"alternative":[92],"enforcing":[94],"Zero":[95],"Trust":[96],"Architecture":[97],"(ZTA)":[98],"principles":[99],"these":[101],"environments":[102,140],"based":[103,127],"on":[104,128,265],"\u201cnever":[106],"trust,":[107],"always":[108],"verify\u201d":[109],"principle.":[110],"Applying":[111],"ZT":[112],"for":[113],"an":[114,160],"OT":[115],"environment":[116],"through":[117],"its":[118],"network":[119,165,184,263],"(by":[120],"checking":[124],"activities":[126],"ZTA-based":[129],"policies)":[130],"can":[131],"improve":[132],"sustainability":[134],"IoT/OT-based":[139],"changes":[144],"would":[145],"needed":[147],"existing":[150],"infrastructures":[151],"while":[152],"improving":[153],"security.":[154],"For":[155],"this":[156],"reason,":[157],"we":[158,194,235,249],"propose":[159],"architecture":[161],"monitors":[163],"behavior":[166],"compares":[168],"them":[169],"devices'":[172],"proposed":[173,247],"identities":[174],"(their":[175],"IP":[176],"MAC":[178],"addresses).":[179],"We":[180],"first":[181],"monitor":[182],"behaviors,":[185],"create":[186],"flows,":[187],"select":[189],"best":[191],"features.":[192],"Then,":[193],"identify":[195],"individual":[197],"devices":[198],"using":[199],"supervised":[200],"machine":[201],"learning":[202],"techniques":[203],"as":[205,209],"Gradient":[206],"Boosting":[207],"Classifier":[208],"they":[210],"lightweight":[212],"fast":[214],"detection":[216],"compared":[217],"alternatives.":[219],"Our":[220],"results":[221],"show":[222],"high":[223],"accuracy,":[224],"precision,":[225],"recall":[227],"values":[228],"our":[230,237],"experiments.":[231],"Using":[232],"different":[233],"scenarios,":[234],"evaluated":[236],"idea":[238],"if":[240],"device":[242,262],"behaves":[243],"differently":[244],"than":[245],"behavior,":[248],"able":[251],"detect":[253],"put":[255],"firewall":[257],"rule":[258],"blocks":[260],"traffic":[264],"gateway.":[267]},"counts_by_year":[],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
