{"id":"https://openalex.org/W3013918003","doi":"https://doi.org/10.1109/icnc47757.2020.9049748","title":"Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks","display_name":"Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3013918003","doi":"https://doi.org/10.1109/icnc47757.2020.9049748","mag":"3013918003"},"language":"en","primary_location":{"id":"doi:10.1109/icnc47757.2020.9049748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc47757.2020.9049748","pdf_url":null,"source":{"id":"https://openalex.org/S4306498707","display_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050853831","display_name":"Hongyue Kang","orcid":"https://orcid.org/0000-0002-9908-347X"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongyue Kang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, P. R., China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, P. R., China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100461605","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0001-9525-8861"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Liu","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, P. R., China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, P. R., China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017004453","display_name":"Jelena Mi\u0161i\u0107","orcid":"https://orcid.org/0000-0002-1251-3730"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jelena Misic","raw_affiliation_strings":["Ryerson University, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Ryerson University, Toronto, ON, Canada","institution_ids":["https://openalex.org/I530967"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019465701","display_name":"Vojislav B. Mi\u0161i\u0107","orcid":"https://orcid.org/0000-0001-7760-9920"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Vojislav B. Misic","raw_affiliation_strings":["Ryerson University, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Ryerson University, Toronto, ON, Canada","institution_ids":["https://openalex.org/I530967"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024597522","display_name":"Xiaolin Chang","orcid":"https://orcid.org/0000-0002-2975-8857"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolin Chang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, P. R., China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, P. R., China","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5050853831"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":0.2777,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.38058991,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"513","last_page":"517"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.9439975023269653},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.8015113472938538},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.790902316570282},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7593989372253418},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5838390588760376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5550256967544556},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5407363176345825},{"id":"https://openalex.org/keywords/transient","display_name":"Transient (computer programming)","score":0.535556972026825},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4773328900337219},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4749179780483246},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.4376087486743927},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4277615547180176},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2330242395401001},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09733083844184875},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.08809888362884521}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.9439975023269653},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.8015113472938538},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.790902316570282},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7593989372253418},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5838390588760376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5550256967544556},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5407363176345825},{"id":"https://openalex.org/C2780799671","wikidata":"https://www.wikidata.org/wiki/Q17087362","display_name":"Transient (computer programming)","level":2,"score":0.535556972026825},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4773328900337219},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4749179780483246},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.4376087486743927},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4277615547180176},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2330242395401001},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09733083844184875},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08809888362884521},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnc47757.2020.9049748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc47757.2020.9049748","pdf_url":null,"source":{"id":"https://openalex.org/S4306498707","display_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2119239145","https://openalex.org/W2528551565","https://openalex.org/W2561684037","https://openalex.org/W2766503369","https://openalex.org/W2883847230","https://openalex.org/W2889015301","https://openalex.org/W2891619294","https://openalex.org/W2898098096","https://openalex.org/W2900814345","https://openalex.org/W2906034153","https://openalex.org/W2908063670","https://openalex.org/W2921503832","https://openalex.org/W2925289689","https://openalex.org/W2955124936","https://openalex.org/W2963273426","https://openalex.org/W3103995325","https://openalex.org/W6727912060"],"related_works":["https://openalex.org/W2131200604","https://openalex.org/W2739233536","https://openalex.org/W2139102556","https://openalex.org/W2908775618","https://openalex.org/W2278169311","https://openalex.org/W31515701","https://openalex.org/W2482004134","https://openalex.org/W2163507572","https://openalex.org/W2080453744","https://openalex.org/W2474489115"],"abstract_inverted_index":{"Lateral":[0],"movement":[1,59],"attack":[2],"performs":[3],"malicious":[4],"activities":[5],"by":[6],"infecting":[7],"part":[8],"of":[9,52,69,88,131,142],"a":[10,38,53,74,155],"network":[11,55,152],"system":[12,21,56,80],"first":[13,90],"and":[14,36,50,81,107,118,145,160],"then":[15],"moving":[16],"laterally":[17],"to":[18,24,44,97,115,137],"the":[19,47,66,79,85,89,98,120,129,139],"left":[20],"in":[22,32],"order":[23],"compromise":[25],"more":[26],"computers.":[27,71],"It":[28],"is":[29,105,113,134],"widely":[30],"used":[31],"various":[33],"sophisticated":[34],"attacks":[35],"plays":[37],"critical":[39,54],"role.":[40],"This":[41],"paper":[42],"aims":[43],"quantitatively":[45],"analyze":[46],"transient":[48],"security":[49],"dependability":[51],"under":[57],"lateral":[58],"attacks,":[60],"whose":[61],"intruding":[62],"capability":[63],"increases":[64],"with":[65],"increasing":[67],"number":[68],"attacked":[70,95],"We":[72],"propose":[73],"survivability":[75],"model":[76,144],"for":[77,127],"capturing":[78],"adversary":[82],"behaviors":[83],"from":[84,93],"time":[86],"instant":[87],"intrusion":[91],"launched":[92],"any":[94],"computer":[96],"other":[99],"vulnerable":[100],"computers":[101],"until":[102],"defense":[103,161],"solution":[104],"developed":[106],"deployed.":[108],"Stochastic":[109],"Reward":[110],"Nets":[111],"(SRN)":[112],"applied":[114],"automatically":[116],"build":[117],"solve":[119],"model.":[121],"The":[122,147],"formulas":[123],"are":[124],"also":[125],"derived":[126],"calculating":[128],"metrics":[130],"interest.":[132],"Simulation":[133],"carried":[135],"out":[136],"validate":[138],"approximate":[140],"accuracy":[141],"our":[143],"formulas.":[146],"quantitative":[148],"analysis":[149],"can":[150],"help":[151],"administrators":[153],"make":[154],"trade-off":[156],"between":[157],"damage":[158],"loss":[159],"cost.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
