{"id":"https://openalex.org/W4312626950","doi":"https://doi.org/10.1109/idsta55301.2022.9923170","title":"Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework","display_name":"Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework","publication_year":2022,"publication_date":"2022-09-05","ids":{"openalex":"https://openalex.org/W4312626950","doi":"https://doi.org/10.1109/idsta55301.2022.9923170"},"language":"en","primary_location":{"id":"doi:10.1109/idsta55301.2022.9923170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta55301.2022.9923170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"P Rajesh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125823","display_name":"KLE University","ror":"https://ror.org/03aam9155","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210125823"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"P Rajesh","raw_affiliation_strings":["KLEF University"],"affiliations":[{"raw_affiliation_string":"KLEF University","institution_ids":["https://openalex.org/I4210125823"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022704080","display_name":"Mansoor Alam","orcid":"https://orcid.org/0000-0003-1732-205X"},"institutions":[{"id":"https://openalex.org/I102502594","display_name":"Northern Illinois University","ror":"https://ror.org/012wxa772","country_code":"US","type":"education","lineage":["https://openalex.org/I102502594"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mansoor Alam","raw_affiliation_strings":["Northern Illinois University"],"affiliations":[{"raw_affiliation_string":"Northern Illinois University","institution_ids":["https://openalex.org/I102502594"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065362647","display_name":"Mansour Tahernezhadi","orcid":"https://orcid.org/0000-0003-1279-6862"},"institutions":[{"id":"https://openalex.org/I102502594","display_name":"Northern Illinois University","ror":"https://ror.org/012wxa772","country_code":"US","type":"education","lineage":["https://openalex.org/I102502594"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mansour Tahernezhadi","raw_affiliation_strings":["Northern Illinois University"],"affiliations":[{"raw_affiliation_string":"Northern Illinois University","institution_ids":["https://openalex.org/I102502594"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048702436","display_name":"A Monika","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A Monika","raw_affiliation_strings":["SRES-COE"],"affiliations":[{"raw_affiliation_string":"SRES-COE","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075997540","display_name":"G. Kushal Chanakya","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gm Chanakya","raw_affiliation_strings":["SVEC"],"affiliations":[{"raw_affiliation_string":"SVEC","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210125823"],"apc_list":null,"apc_paid":null,"fwci":3.2823,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.92415842,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"4","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.812237024307251},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7633785009384155},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6761406064033508},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6117432713508606},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.5501193404197693},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5079153180122375},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5024185180664062},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.474870890378952},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4643080532550812},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.43603309988975525},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09881478548049927}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.812237024307251},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7633785009384155},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6761406064033508},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6117432713508606},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.5501193404197693},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5079153180122375},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5024185180664062},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.474870890378952},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4643080532550812},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.43603309988975525},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09881478548049927},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idsta55301.2022.9923170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta55301.2022.9923170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W133742173","https://openalex.org/W1492196703","https://openalex.org/W1966741850","https://openalex.org/W1997222770","https://openalex.org/W2004360894","https://openalex.org/W2044353873","https://openalex.org/W2168917894","https://openalex.org/W2296425371","https://openalex.org/W2407451098","https://openalex.org/W2521426528","https://openalex.org/W2561342496","https://openalex.org/W2601260651","https://openalex.org/W2739470728","https://openalex.org/W2758108284","https://openalex.org/W2760313715","https://openalex.org/W2783245716","https://openalex.org/W2892859754","https://openalex.org/W2907977958","https://openalex.org/W2911224031","https://openalex.org/W2971170266","https://openalex.org/W2971727546","https://openalex.org/W2972115433","https://openalex.org/W2980790296","https://openalex.org/W3001458940","https://openalex.org/W3011113812","https://openalex.org/W3033945962","https://openalex.org/W3048012689","https://openalex.org/W3129950817","https://openalex.org/W3132913734","https://openalex.org/W3183530150","https://openalex.org/W4213378403","https://openalex.org/W4230908098","https://openalex.org/W6629523211","https://openalex.org/W6697204302","https://openalex.org/W6713887106","https://openalex.org/W6734100528","https://openalex.org/W6756520748","https://openalex.org/W6758187493"],"related_works":["https://openalex.org/W2154523322","https://openalex.org/W2083200807","https://openalex.org/W1603137082","https://openalex.org/W2364195017","https://openalex.org/W2355430452","https://openalex.org/W1951195060","https://openalex.org/W2049983405","https://openalex.org/W2392315374","https://openalex.org/W2351776620","https://openalex.org/W2900584019"],"abstract_inverted_index":{"With":[0],"a":[1,28,70],"rapid":[2],"increase":[3],"in":[4,38,64,79,123,182,188,194,199],"Cyber-attacks,":[5],"Threat":[6,11],"hunters":[7],"such":[8,86],"as":[9],"Cyber":[10],"Intelligence":[12],"(CTI)":[13],"and":[14,44,58,77,83,89,118,128,146,161,169,198],"their":[15,150],"teams":[16],"requires":[17],"to":[18,26,55,73,81,93,102,112,125,148,172],"analyze":[19],"different":[20,142],"techniques":[21,76,168,178],"being":[22],"employed":[23],"by":[24,96,121],"adversaries":[25,99,179],"hit":[27],"target":[29],"objective.":[30],"The":[31],"attacker":[32],"objectives":[33],"can":[34,68],"be":[35,94],"from":[36,85],"entering":[37],"your":[39],"network,":[40],"accessing":[41],"system":[42,49,109],"files":[43],"folders":[45],"remotely,":[46],"getting":[47],"higher":[48],"privileges,":[50],"stealing":[51],"confidential":[52],"passwords":[53],"etc.":[54],"destroying":[56],"systems":[57],"network.":[59],"Pre":[60],"attack":[61,116],"patterns":[62],"defined":[63],"enterprise":[65,105],"knowledge":[66,164],"base":[67],"play":[69],"major":[71],"role":[72],"track":[74],"adversary":[75],"procedures":[78,170],"order":[80,124],"defend":[82,130],"response":[84],"attacks.":[87],"Anomalous":[88],"intrusion":[90],"activities":[91],"need":[92],"unfolded":[95],"the":[97],"approach":[98],"are":[100,180],"adopting":[101],"demolish":[103],"secure":[104],"networks.":[106],"An":[107],"appropriate":[108],"is":[110,158],"required":[111],"better":[113],"handle":[114],"modern":[115],"approaches":[117],"strategies":[119],"used":[120],"attackers":[122],"identify":[126],"vulnerabilities":[127],"successfully":[129],"network":[131],"channels.":[132],"In":[133],"this":[134],"paper,":[135],"we":[136],"present":[137],"an":[138,159,174],"in-depth":[139],"analysis":[140],"of":[141,166],"threat":[143,191],"detection":[144],"methods":[145],"how":[147],"mitigate":[149],"impacts":[151],"using":[152,181],"MITRE":[153],"ATT&CK":[154],"framework.":[155],"This":[156],"framework":[157],"extensively":[160],"freely":[162],"accessible":[163],"repository":[165],"tactics,":[167],"(TTPs)":[171],"gain":[173],"insight":[175],"into":[176],"what":[177],"real":[183],"time":[184],"applications":[185],"which":[186],"aids":[187],"developing":[189],"robust":[190],"controlling":[192],"programs":[193],"private":[195],"sector,":[196],"government,":[197],"cybersecurity":[200],"community.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":9}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
