{"id":"https://openalex.org/W4387089498","doi":"https://doi.org/10.1109/cita58204.2023.10262639","title":"Fingerprinting generation for Advanced Persistent Threats (APT) detection using Machine Learning techniques","display_name":"Fingerprinting generation for Advanced Persistent Threats (APT) detection using Machine Learning techniques","publication_year":2023,"publication_date":"2023-08-03","ids":{"openalex":"https://openalex.org/W4387089498","doi":"https://doi.org/10.1109/cita58204.2023.10262639"},"language":"en","primary_location":{"id":"doi:10.1109/cita58204.2023.10262639","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cita58204.2023.10262639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 13th International Conference on Information Technology in Asia (CITA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101249233","display_name":"Soo Yin Yi","orcid":null},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Soo Yin Yi","raw_affiliation_strings":["University Sains Malaysia,School of Computer Sciences,Penang,Malaysia","School of Computer Sciences, University Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"University Sains Malaysia,School of Computer Sciences,Penang,Malaysia","institution_ids":["https://openalex.org/I139322472"]},{"raw_affiliation_string":"School of Computer Sciences, University Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008643553","display_name":"Manmeet Mahinderjit Singh","orcid":"https://orcid.org/0000-0001-8081-5223"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Manmeet Mahinderjit Singh","raw_affiliation_strings":["University Sains Malaysia,School of Computer Sciences,Penang,Malaysia","School of Computer Sciences, University Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"University Sains Malaysia,School of Computer Sciences,Penang,Malaysia","institution_ids":["https://openalex.org/I139322472"]},{"raw_affiliation_string":"School of Computer Sciences, University Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012702951","display_name":"Gian Chand Sodhy","orcid":"https://orcid.org/0000-0002-2955-6462"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Gian Chand Sodhy","raw_affiliation_strings":["University Sains Malaysia,School of Computer Sciences,Penang,Malaysia","School of Computer Sciences, University Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"University Sains Malaysia,School of Computer Sciences,Penang,Malaysia","institution_ids":["https://openalex.org/I139322472"]},{"raw_affiliation_string":"School of Computer Sciences, University Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112842511","display_name":"Thulfiqar Jabar","orcid":null},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Thulfiqar Jabar","raw_affiliation_strings":["University Sains Malaysia,School of Computer Sciences,Penang,Malaysia","School of Computer Sciences, University Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"University Sains Malaysia,School of Computer Sciences,Penang,Malaysia","institution_ids":["https://openalex.org/I139322472"]},{"raw_affiliation_string":"School of Computer Sciences, University Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101249233"],"corresponding_institution_ids":["https://openalex.org/I139322472"],"apc_list":null,"apc_paid":null,"fwci":0.2038,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.45064163,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"31","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8236973285675049},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6765737533569336},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.545450747013092},{"id":"https://openalex.org/keywords/gradient-boosting","display_name":"Gradient boosting","score":0.5411474108695984},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.5399377942085266},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5310528874397278},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.44993096590042114},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34497082233428955},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.22181537747383118}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8236973285675049},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6765737533569336},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.545450747013092},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.5411474108695984},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.5399377942085266},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5310528874397278},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.44993096590042114},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34497082233428955},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.22181537747383118}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cita58204.2023.10262639","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cita58204.2023.10262639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 13th International Conference on Information Technology in Asia (CITA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321147","display_name":"Ministry of Higher Education","ror":"https://ror.org/0512bh102"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2342850280","https://openalex.org/W2346127545","https://openalex.org/W2953684237","https://openalex.org/W2959653735","https://openalex.org/W2964782384","https://openalex.org/W3001675796","https://openalex.org/W3033897840","https://openalex.org/W3034336180","https://openalex.org/W3110062799","https://openalex.org/W3133235094","https://openalex.org/W3133377806","https://openalex.org/W3146778731","https://openalex.org/W3205584565","https://openalex.org/W3209870726","https://openalex.org/W4205611519","https://openalex.org/W4220674262","https://openalex.org/W4220712146","https://openalex.org/W4248336048","https://openalex.org/W4283396616","https://openalex.org/W4297847363","https://openalex.org/W4312362177","https://openalex.org/W6766604438","https://openalex.org/W6802348923","https://openalex.org/W6843810141","https://openalex.org/W6847391910"],"related_works":["https://openalex.org/W2967733078","https://openalex.org/W3204430031","https://openalex.org/W3137904399","https://openalex.org/W4310492845","https://openalex.org/W2885778889","https://openalex.org/W4310224730","https://openalex.org/W2766514146","https://openalex.org/W4289703016","https://openalex.org/W2885516856","https://openalex.org/W3094138326"],"abstract_inverted_index":{"With":[0],"the":[1,38,64],"advent":[2],"of":[3,37],"Advanced":[4],"Persistent":[5],"Threats":[6],"(APTs),":[7],"it":[8],"has":[9],"become":[10],"more":[11,91],"challenging":[12],"to":[13,29],"effectively":[14,30,86],"detect":[15,31],"and":[16,45,74],"comprehend":[17],"computer":[18],"system":[19],"attacks.":[20],"This":[21,70],"paper":[22],"proposed":[23,82],"an":[24],"Intrusion":[25],"Detection":[26],"System":[27],"(IDS)":[28],"APT":[32,39,53,57,68,78,88,97,106],"activities":[33,89],"in":[34,95,104],"each":[35],"stage":[36],"life":[40],"cycle":[41],"using":[42,76],"decision":[43],"trees":[44],"gradient-boosting":[46],"algorithms.":[47],"In":[48],"addition,":[49],"this":[50,100],"model":[51,65,71,83,101],"generates":[52],"fingerprints":[54],"by":[55],"optimizing":[56],"stages":[58],"or":[59],"attack":[60],"paths":[61],"that":[62,85],"help":[63],"with":[66,90],"early":[67],"detection.":[69],"is":[72],"evaluated":[73],"validated":[75],"Dataset":[77],"(DAPT)":[79],"2020.":[80],"The":[81],"proved":[84,102],"classified":[87],"than":[92],"97.63":[93],"accuracy":[94],"most":[96],"stages.":[98],"Furthermore,":[99],"effective":[103],"generating":[105],"fingerprints.":[107]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
