{"id":"https://openalex.org/W3127433831","doi":"https://doi.org/10.1109/jiot.2021.3055937","title":"ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks","display_name":"ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks","publication_year":2021,"publication_date":"2021-02-02","ids":{"openalex":"https://openalex.org/W3127433831","doi":"https://doi.org/10.1109/jiot.2021.3055937","mag":"3127433831"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3055937","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3055937","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002072930","display_name":"Kalupahana Liyanage Kushan Sudheera","orcid":"https://orcid.org/0000-0002-2502-4426"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Kalupahana Liyanage Kushan Sudheera","raw_affiliation_strings":["Department of Computer Science, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012540529","display_name":"Dinil Mon Divakaran","orcid":"https://orcid.org/0000-0001-8706-432X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dinil Mon Divakaran","raw_affiliation_strings":["Department of Cyber Security Research and Development, Trustwave, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security Research and Development, Trustwave, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034026890","display_name":"Rhishi Pratap Singh","orcid":"https://orcid.org/0000-0002-2758-5200"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rhishi Pratap Singh","raw_affiliation_strings":["Collins Aerospace, Bengaluru, India"],"affiliations":[{"raw_affiliation_string":"Collins Aerospace, Bengaluru, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080394785","display_name":"Mohan Gurusamy","orcid":"https://orcid.org/0000-0001-6764-268X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Mohan Gurusamy","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002072930"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":6.5335,"has_fulltext":false,"cited_by_count":58,"citation_normalized_percentile":{"value":0.96783785,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"8","issue":"8","first_page":"6591","last_page":"6607"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8604016304016113},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7633397579193115},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7430256605148315},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.7152519226074219},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6471501588821411},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.5407024621963501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.475197434425354},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4589669704437256},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4327920377254486},{"id":"https://openalex.org/keywords/adept","display_name":"Adept","score":0.43207627534866333},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33705371618270874}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8604016304016113},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7633397579193115},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7430256605148315},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.7152519226074219},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6471501588821411},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.5407024621963501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.475197434425354},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4589669704437256},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4327920377254486},{"id":"https://openalex.org/C2776904630","wikidata":"https://www.wikidata.org/wiki/Q356336","display_name":"Adept","level":3,"score":0.43207627534866333},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33705371618270874},{"id":"https://openalex.org/C108215921","wikidata":"https://www.wikidata.org/wiki/Q603741","display_name":"Prodrug","level":2,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C98274493","wikidata":"https://www.wikidata.org/wiki/Q128406","display_name":"Pharmacology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2021.3055937","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3055937","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:scholarbank.nus.edu.sg:10635/194969","is_oa":false,"landing_page_url":"https://scholarbank.nus.edu.sg/handle/10635/194969","pdf_url":null,"source":{"id":"https://openalex.org/S7407052290","display_name":"National University of Singapore","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Elements","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W17316494","https://openalex.org/W898894848","https://openalex.org/W1506285740","https://openalex.org/W1537336823","https://openalex.org/W1989728020","https://openalex.org/W2077121139","https://openalex.org/W2102941975","https://openalex.org/W2108867737","https://openalex.org/W2166559705","https://openalex.org/W2171612826","https://openalex.org/W2507635762","https://openalex.org/W2557450880","https://openalex.org/W2560810941","https://openalex.org/W2565148042","https://openalex.org/W2597646562","https://openalex.org/W2620213176","https://openalex.org/W2686848947","https://openalex.org/W2738663878","https://openalex.org/W2748868501","https://openalex.org/W2754472824","https://openalex.org/W2775542991","https://openalex.org/W2797742547","https://openalex.org/W2806370396","https://openalex.org/W2887131850","https://openalex.org/W2888096149","https://openalex.org/W2901016790","https://openalex.org/W2912601938","https://openalex.org/W2930144424","https://openalex.org/W2946001656","https://openalex.org/W2947969447","https://openalex.org/W2963577414","https://openalex.org/W2963748489","https://openalex.org/W2968383486","https://openalex.org/W2972023276","https://openalex.org/W2993465391","https://openalex.org/W2998574808","https://openalex.org/W3007016253","https://openalex.org/W3011932477","https://openalex.org/W3088790432","https://openalex.org/W3099976866","https://openalex.org/W3105750153","https://openalex.org/W3133369889","https://openalex.org/W3142802369","https://openalex.org/W3195894106","https://openalex.org/W6600692465","https://openalex.org/W6630198464","https://openalex.org/W6735141559","https://openalex.org/W6739320202","https://openalex.org/W6743493502","https://openalex.org/W6753981864","https://openalex.org/W6756410040","https://openalex.org/W6767139982","https://openalex.org/W6800639451"],"related_works":["https://openalex.org/W2173729515","https://openalex.org/W2912886476","https://openalex.org/W1603181330","https://openalex.org/W2070624437","https://openalex.org/W14795822","https://openalex.org/W2413844292","https://openalex.org/W2168341697","https://openalex.org/W1983685006","https://openalex.org/W4366978761","https://openalex.org/W2274625902"],"abstract_inverted_index":{"The":[0],"fast-growing":[1],"Internet-of-Things":[2],"(IoT)":[3],"market":[4],"has":[5],"opened":[6],"up":[7],"a":[8,69,81,111,117,150],"large":[9],"threat":[10],"landscape,":[11],"given":[12],"the":[13,49,76,160,174,177,180],"wide":[14],"deployment":[15],"of":[16,31,92,179,185],"IoT":[17,27,93],"devices":[18,28,94],"in":[19,59,80,86,159,183,188],"both":[20,135,141],"consumer":[21],"and":[22,34,38,47,61,74,137,143,170,191],"commercial":[23],"spaces.":[24],"Attacks":[25],"on":[26],"generally":[29],"consist":[30],"multiple":[32],"stages":[33,51,79,158],"are":[35,123],"dispersed":[36],"spatially":[37],"temporally.":[39],"These":[40],"characteristics":[41],"make":[42],"it":[43],"challenging":[44],"to":[45,56,72,103,110,116,154],"detect":[46,73],"identify":[48,75,155],"attack":[50,78,157],"using":[52,125,140],"solutions":[53],"that":[54],"tend":[55],"be":[57],"localized":[58],"space":[60],"time.":[62],"In":[63],"this":[64],"work,":[65],"we":[66,148],"present":[67],"Adept,":[68],"distributed":[70],"framework":[71,182],"individual":[77,156],"coordinated":[82],"attack.":[83],"Adept":[84],"works":[85],"three":[87],"phases.":[88],"First,":[89],"network":[90,172],"traffic":[91],"is":[95,114],"processed":[96],"locally":[97],"for":[98,130],"detecting":[99,131],"anomalies":[100],"with":[101,168],"respect":[102],"their":[104],"benign":[105],"profiles.":[106],"Any":[107],"alert":[108],"corresponding":[109],"potential":[112],"anomaly":[113],"sent":[115],"security":[118],"manager,":[119],"where":[120],"aggregated":[121],"alerts":[122],"mined,":[124],"frequent":[126],"itemset":[127],"mining":[128],"(FIM),":[129],"patterns":[132],"correlated":[133],"across":[134],"time":[136],"space.":[138],"Finally,":[139],"alert-level":[142],"pattern-level":[144],"information":[145],"as":[146],"features,":[147],"employ":[149],"machine":[151],"learning":[152],"approach":[153],"generated":[161],"alerts.":[162],"We":[163],"carry":[164],"out":[165],"extensive":[166],"experiments,":[167],"emulated":[169],"realistic":[171],"traffic;":[173],"results":[175],"demonstrate":[176],"effectiveness":[178],"proposed":[181],"terms":[184],"its":[186],"ability":[187],"attack-stage":[189],"detection":[190],"identification.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
