{"id":"https://openalex.org/W4321606865","doi":"https://doi.org/10.1109/comsnets56262.2023.10041418","title":"RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks","display_name":"RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks","publication_year":2023,"publication_date":"2023-01-03","ids":{"openalex":"https://openalex.org/W4321606865","doi":"https://doi.org/10.1109/comsnets56262.2023.10041418"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets56262.2023.10041418","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets56262.2023.10041418","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072903565","display_name":"Ghanshyam S. Bopche","orcid":"https://orcid.org/0000-0003-0691-8931"},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ghanshyam S. Bopche","raw_affiliation_strings":["National Institute of Technology,Department of Computer Applications,Tiruchirappalli,India","Department of Computer Applications, National Institute of Technology, Tiruchirappalli, India"],"raw_orcid":"https://orcid.org/0000-0003-0691-8931","affiliations":[{"raw_affiliation_string":"National Institute of Technology,Department of Computer Applications,Tiruchirappalli,India","institution_ids":["https://openalex.org/I122964287"]},{"raw_affiliation_string":"Department of Computer Applications, National Institute of Technology, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066582526","display_name":"N. Gopal","orcid":"https://orcid.org/0000-0003-0232-321X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gopal N. Rai","raw_affiliation_strings":["Collins Aerospace India (Pvt.) Limited,Hyderabad,India","Collins Aerospace India (Pvt.) Limited, Hyderabad, India"],"raw_orcid":"https://orcid.org/0000-0003-0232-321X","affiliations":[{"raw_affiliation_string":"Collins Aerospace India (Pvt.) Limited,Hyderabad,India","institution_ids":[]},{"raw_affiliation_string":"Collins Aerospace India (Pvt.) Limited, Hyderabad, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005579376","display_name":"Deepnarayan Tiwari","orcid":"https://orcid.org/0000-0002-2105-6578"},"institutions":[{"id":"https://openalex.org/I4210156257","display_name":"National Research Development Corporation","ror":"https://ror.org/051bx8r16","country_code":"IN","type":"other","lineage":["https://openalex.org/I4210156257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepnarayan Tiwari","raw_affiliation_strings":["National Payments Corporation of India (NPCI),Mumbai,India","National Payments Corporation of India (NPCI), Mumbai, India"],"raw_orcid":"https://orcid.org/0000-0002-2105-6578","affiliations":[{"raw_affiliation_string":"National Payments Corporation of India (NPCI),Mumbai,India","institution_ids":["https://openalex.org/I4210156257"]},{"raw_affiliation_string":"National Payments Corporation of India (NPCI), Mumbai, India","institution_ids":["https://openalex.org/I4210156257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072903565"],"corresponding_institution_ids":["https://openalex.org/I122964287"],"apc_list":null,"apc_paid":null,"fwci":0.5903,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66181648,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"48","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9580000042915344,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8025652170181274},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6808303594589233},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.678476095199585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6243071556091309},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.5797622203826904},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5786697864532471},{"id":"https://openalex.org/keywords/enterprise-private-network","display_name":"Enterprise private network","score":0.47831252217292786},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.447085440158844},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42818158864974976},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4213120937347412},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3780365586280823},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.3726311922073364}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8025652170181274},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6808303594589233},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.678476095199585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6243071556091309},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.5797622203826904},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5786697864532471},{"id":"https://openalex.org/C149859251","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Enterprise private network","level":2,"score":0.47831252217292786},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.447085440158844},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42818158864974976},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4213120937347412},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3780365586280823},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3726311922073364},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets56262.2023.10041418","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets56262.2023.10041418","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W100511799","https://openalex.org/W151026171","https://openalex.org/W1454791451","https://openalex.org/W1483760347","https://openalex.org/W1493327060","https://openalex.org/W1504280683","https://openalex.org/W1548523399","https://openalex.org/W1963548447","https://openalex.org/W1975990814","https://openalex.org/W1986126834","https://openalex.org/W1987511287","https://openalex.org/W2021204413","https://openalex.org/W2031175798","https://openalex.org/W2054127354","https://openalex.org/W2064462335","https://openalex.org/W2083658929","https://openalex.org/W2100033648","https://openalex.org/W2101438812","https://openalex.org/W2110908300","https://openalex.org/W2117694832","https://openalex.org/W2121805588","https://openalex.org/W2129586531","https://openalex.org/W2134156960","https://openalex.org/W2141289698","https://openalex.org/W2144888077","https://openalex.org/W2150127671","https://openalex.org/W2150802402","https://openalex.org/W2150890217","https://openalex.org/W2151369956","https://openalex.org/W2156607688","https://openalex.org/W2157554212","https://openalex.org/W2250171293","https://openalex.org/W2303212871","https://openalex.org/W2407732742","https://openalex.org/W2498195183","https://openalex.org/W2621154948","https://openalex.org/W2781384877","https://openalex.org/W2902063645","https://openalex.org/W3134018028","https://openalex.org/W4214825195","https://openalex.org/W4231067782","https://openalex.org/W4237936646","https://openalex.org/W4294204356","https://openalex.org/W4298625430","https://openalex.org/W6628516419","https://openalex.org/W6635235395"],"related_works":["https://openalex.org/W2393340519","https://openalex.org/W2390459954","https://openalex.org/W4220885008","https://openalex.org/W2057803998","https://openalex.org/W4298219515","https://openalex.org/W2993489091","https://openalex.org/W2366522092","https://openalex.org/W4360997342","https://openalex.org/W2358649166","https://openalex.org/W36040077"],"abstract_inverted_index":{"The":[0,173,196],"extensive":[1],"use":[2],"of":[3,32,103,106,164,214],"information":[4],"and":[5,10,42,51,141,212],"communication":[6],"technology":[7],"in":[8,40],"government":[9],"private":[11],"organizations":[12],"brings":[13],"new":[14,30],"security":[15,78,129],"vulnerabilities.":[16,92,195],"These":[17],"vulnerabilities":[18,50,95],"provide":[19],"multiple":[20,49],"opportunities":[21],"for":[22,70,76,136,169,183],"adversaries":[23],"to":[24,54,58,159],"compromise":[25],"organizations'":[26],"business-critical":[27],"resources.":[28,61],"Nowadays,":[29],"types":[31],"sophisticated":[33],"Cyberattacks,":[34],"namely":[35],"\u201cmultistage":[36],"attacks\u201d":[37],"keep":[38],"increasing":[39],"sophistication":[41],"number.":[43],"Essentially,":[44],"the":[45,59,66,77,86,90,104,110,118,144,147,161,189,193,200,203,210],"adversary":[46],"chains":[47],"together":[48],"exploits":[52],"them":[53],"obtain":[55],"incremental":[56],"access":[57],"network":[60,128,139,148,171,186,204],"In":[62],"practice,":[63],"mitigating":[64],"all":[65],"identified":[67,91,194],"vulnerabilities,":[68],"even":[69],"a":[71,125,137,152,184,218],"moderate-sized":[72],"network,":[73],"is":[74],"impractical":[75],"administrator.":[79],"Existing":[80],"vulnerability":[81,115,119,197],"scanners":[82,98,116],"do":[83],"not":[84,100],"consider":[85],"causal":[87],"dependency":[88],"between":[89],"Moreover,":[93,188],"most":[94],"reported":[96],"by":[97],"are":[99],"exploitable":[101],"because":[102],"absence":[105],"enabling":[107],"condition(s).":[108],"Therefore,":[109],"administrators'":[111],"absolute":[112],"reliance":[113],"on":[114,155],"makes":[117],"patching":[120],"process":[121],"ineffective.":[122],"Attack":[123],"graph,":[124],"popular":[126],"graphical":[127],"model,":[130],"depicts":[131],"potential":[132],"multistage,":[133],"multi-host":[134],"attacks":[135],"vulnerable":[138,185],"configuration":[140],"thereby":[142],"helps":[143],"administrator":[145,201],"harden":[146],"effectively.":[149],"We":[150,207],"propose":[151],"framework":[153,191,216],"based":[154],"recursive":[156],"composition":[157],"algebra":[158,174],"explore":[160],"additional":[162],"advantages":[163],"using":[165],"an":[166,176],"attack":[167,177,181],"graph":[168,178],"proactive":[170],"hardening.":[172],"generates":[175],"(free":[179],"from":[180],"cycles)":[182],"configuration.":[187],"proposed":[190],"classifies":[192],"classes":[198],"help":[199],"prioritize":[202],"hardening":[205],"activities.":[206],"have":[208],"validated":[209],"effectiveness":[211],"applicability":[213],"our":[215],"through":[217],"case":[219],"study.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
