{"id":"https://openalex.org/W4406417782","doi":"https://doi.org/10.1109/ic3i61595.2024.10829149","title":"Harnessing Machine Learning for APTs Detection and Mitigation in Large-Scale Networks","display_name":"Harnessing Machine Learning for APTs Detection and Mitigation in Large-Scale Networks","publication_year":2024,"publication_date":"2024-09-18","ids":{"openalex":"https://openalex.org/W4406417782","doi":"https://doi.org/10.1109/ic3i61595.2024.10829149"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i61595.2024.10829149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i61595.2024.10829149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015318817","display_name":"Reeta Mishra","orcid":"https://orcid.org/0009-0001-7219-425X"},"institutions":[{"id":"https://openalex.org/I55016150","display_name":"Manav Rachna International Institute of Research and Studies","ror":"https://ror.org/02kf4r633","country_code":"IN","type":"education","lineage":["https://openalex.org/I4405253735","https://openalex.org/I55016150"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Reeta Mishra","raw_affiliation_strings":["Manav Rachna University,Department of Computer Science &#x0026; Technology,Faridabad,Haryana,India"],"affiliations":[{"raw_affiliation_string":"Manav Rachna University,Department of Computer Science &#x0026; Technology,Faridabad,Haryana,India","institution_ids":["https://openalex.org/I55016150"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115894617","display_name":"Neelu Chauduray","orcid":null},"institutions":[{"id":"https://openalex.org/I55016150","display_name":"Manav Rachna International Institute of Research and Studies","ror":"https://ror.org/02kf4r633","country_code":"IN","type":"education","lineage":["https://openalex.org/I4405253735","https://openalex.org/I55016150"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neelu Chauduray","raw_affiliation_strings":["Manav Rachna University,Department of Computer Science &#x0026; Technology,Faridabad,Haryana,India"],"affiliations":[{"raw_affiliation_string":"Manav Rachna University,Department of Computer Science &#x0026; Technology,Faridabad,Haryana,India","institution_ids":["https://openalex.org/I55016150"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064432717","display_name":"Gaganjot Kaur","orcid":"https://orcid.org/0000-0001-7101-3990"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gaganjot Kaur","raw_affiliation_strings":["Raj Kumar Goel Institute of Technology,Department of Computer Science,Ghaziabad,U.P,India"],"affiliations":[{"raw_affiliation_string":"Raj Kumar Goel Institute of Technology,Department of Computer Science,Ghaziabad,U.P,India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015318817"],"corresponding_institution_ids":["https://openalex.org/I55016150"],"apc_list":null,"apc_paid":null,"fwci":0.3653,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66187153,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"565","last_page":"571"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7175367474555969},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.6247557401657104},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3847965598106384},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32587137818336487}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7175367474555969},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.6247557401657104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3847965598106384},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32587137818336487},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i61595.2024.10829149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i61595.2024.10829149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2286303343","https://openalex.org/W2545820541","https://openalex.org/W2560932476","https://openalex.org/W2818789173","https://openalex.org/W2959653735","https://openalex.org/W3005805195","https://openalex.org/W3111818397","https://openalex.org/W3112733201","https://openalex.org/W3118220620","https://openalex.org/W3160455160","https://openalex.org/W3161599138","https://openalex.org/W4283374720","https://openalex.org/W4313591247","https://openalex.org/W4327517892","https://openalex.org/W4387385055","https://openalex.org/W4387491243","https://openalex.org/W4390970201","https://openalex.org/W4391582407","https://openalex.org/W4391897408","https://openalex.org/W4394712644","https://openalex.org/W4400879713","https://openalex.org/W4401273105"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474"],"abstract_inverted_index":{"A":[0],"significant":[1],"and":[2,27,42,59,85,103,107,134,141,147,176,196],"ongoing":[3],"cyber":[4,184,221],"security":[5,36,222],"concern":[6],"is":[7],"the":[8,65,145,167,191,194],"presence":[9],"of":[10,67,149,169,182,193,211],"Advanced":[11],"Persistent":[12],"Threats":[13],"(APTs),":[14,76],"especially":[15],"in":[16,153,229],"large-scale":[17,230],"networks.":[18],"APTs":[19],"are":[20],"known":[21],"for":[22,39,53,125,164,199],"their":[23],"lengthy":[24],"lifespan,":[25],"stealth,":[26],"sophistication.":[28],"As":[29],"a":[30,50,208],"result,":[31],"they":[32],"frequently":[33],"elude":[34],"conventional":[35],"measures,":[37],"calling":[38],"more":[40],"flexible":[41],"durable":[43],"solutions.":[44],"Machine":[45],"learning":[46,69,95,99,105,123,174,214],"(ML)":[47,70,124,215],"has":[48],"become":[49],"potent":[51],"instrument":[52],"improving":[54],"these":[55],"sophisticated":[56],"threats\u2019":[57],"detection":[58],"response.":[60],"This":[61],"review":[62,203],"paper":[63,113],"investigates":[64],"use":[66],"machine":[68,94,122,213],"to":[71,109,118,179,205,219],"counteract":[72],"advanced":[73,225],"persistent":[74,226],"threats":[75,227],"emphasizing":[77],"critical":[78],"techniques":[79,152],"including":[80],"anomaly":[81],"detection,":[82,127],"behavioural":[83],"analysis,":[84],"threat":[86],"intelligence":[87],"integration.":[88],"We":[89,143],"investigate":[90],"how":[91,212],"successfully":[92],"different":[93],"algorithms-such":[96],"as":[97,129],"deep":[98],"models,":[100],"supervised,":[101],"unsupervised,":[102],"reinforcement":[104],"approaches-identify":[106],"react":[108],"APT":[110,126],"activities.":[111],"The":[112,158],"also":[114,160],"discusses":[115],"important":[116],"obstacles":[117],"overcome":[119],"when":[120],"using":[121,155],"such":[128],"problems":[130],"with":[131],"data":[132],"quantity":[133],"quality,":[135],"attacker":[136],"evasion":[137],"strategies,":[138],"scalability":[139],"issues,":[140],"more.":[142],"highlight":[144],"advantages":[146],"disadvantages":[148],"existing":[150],"MLbased":[151],"practice":[154],"real-world":[156],"examples.":[157],"report":[159],"addresses":[161],"future":[162,200],"areas":[163],"research,":[165,201],"highlighting":[166],"necessity":[168],"improved":[170],"model":[171],"robustness,":[172],"adaptive":[173],"capabilities,":[175],"cooperative":[177],"efforts":[178],"remain":[180],"ahead":[181],"developing":[183],"threats.":[185],"With":[186],"an":[187],"emphasis":[188],"on":[189],"both":[190],"state":[192],"art":[195],"potential":[197],"directions":[198],"this":[202],"seeks":[204],"give":[206],"readers":[207],"thorough":[209],"grasp":[210],"can":[216],"be":[217],"used":[218],"fortify":[220],"defences":[223],"against":[224],"(APTs)":[228],"network":[231],"systems.":[232]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
