{"id":"https://openalex.org/W4401751757","doi":"https://doi.org/10.1109/svcc61185.2024.10637360","title":"Exploring Scalable Bayesian Networks For Identification of Zero-day Attack Paths","display_name":"Exploring Scalable Bayesian Networks For Identification of Zero-day Attack Paths","publication_year":2024,"publication_date":"2024-06-17","ids":{"openalex":"https://openalex.org/W4401751757","doi":"https://doi.org/10.1109/svcc61185.2024.10637360"},"language":"en","primary_location":{"id":"doi:10.1109/svcc61185.2024.10637360","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/svcc61185.2024.10637360","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Silicon Valley Cybersecurity Conference (SVCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111296982","display_name":"Ravi Nitinkumar Patel","orcid":null},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ravi Nitinkumar Patel","raw_affiliation_strings":["California State University,Department of Computer Science,Sacramento"],"affiliations":[{"raw_affiliation_string":"California State University,Department of Computer Science,Sacramento","institution_ids":["https://openalex.org/I43522216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101895218","display_name":"Xiaomei Zhang","orcid":"https://orcid.org/0000-0003-1219-268X"},"institutions":[{"id":"https://openalex.org/I90274647","display_name":"University of South Carolina Beaufort","ror":"https://ror.org/05ked8481","country_code":"US","type":"education","lineage":["https://openalex.org/I90274647"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaomei Zhang","raw_affiliation_strings":["University of South Carolina,Dept. of Computer Science and Mathematics,Beaufort"],"affiliations":[{"raw_affiliation_string":"University of South Carolina,Dept. of Computer Science and Mathematics,Beaufort","institution_ids":["https://openalex.org/I90274647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100537852","display_name":"Xiaoyan Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoyan Sun","raw_affiliation_strings":["Worcester Polytechnic Institute,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute,Department of Computer Science","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112010593","display_name":"Jun Dai","orcid":"https://orcid.org/0000-0002-4638-4615"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Dai","raw_affiliation_strings":["Worcester Polytechnic Institute,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute,Department of Computer Science","institution_ids":["https://openalex.org/I107077323"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111296982"],"corresponding_institution_ids":["https://openalex.org/I43522216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1422839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11303","display_name":"Bayesian Modeling and Causal Inference","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6837657690048218},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5873415470123291},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5804451704025269},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.538937509059906},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.44850245118141174},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3782973885536194},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2656131088733673}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6837657690048218},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5873415470123291},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5804451704025269},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.538937509059906},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.44850245118141174},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3782973885536194},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2656131088733673},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/svcc61185.2024.10637360","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/svcc61185.2024.10637360","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Silicon Valley Cybersecurity Conference (SVCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1832277845","https://openalex.org/W1941427975","https://openalex.org/W2042910589","https://openalex.org/W2085493738","https://openalex.org/W2092445266","https://openalex.org/W2144043693","https://openalex.org/W2271004381","https://openalex.org/W2794988934","https://openalex.org/W2982875109","https://openalex.org/W3099913676","https://openalex.org/W4297792526","https://openalex.org/W6774024915"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W4235240664","https://openalex.org/W2965083567","https://openalex.org/W1838576100","https://openalex.org/W2095886385","https://openalex.org/W2889616422","https://openalex.org/W2089704382","https://openalex.org/W1983399550","https://openalex.org/W97075385","https://openalex.org/W2357523926"],"abstract_inverted_index":{"Detecting":[0],"zero-day":[1,33,105,139,183],"attacks":[2],"is":[3],"still":[4],"a":[5,116,145],"challenging":[6],"problem":[7],"for":[8,32,180],"large":[9,118,146],"enterprise":[10],"networks.":[11,163],"Some":[12],"previous":[13],"research":[14],"work":[15,175],"captures":[16],"the":[17,27,47,61,76,79,92,96,104,113,121,129,137,153,161,165,190],"system-level":[18],"activities":[19],"and":[20,128,159],"then":[21],"builds":[22],"Bayesian":[23,40,80,97,119,130,147,162,169,195],"networks":[24,41,134,170],"to":[25,60,90,102,135,156,174],"collect":[26],"intrusion":[28],"alerts":[29],"as":[30,176],"evidence":[31],"attack":[34,106,140,184],"path":[35],"detection.":[36],"However,":[37],"since":[38],"such":[39],"are":[42,72],"developed":[43],"on":[44,110],"top":[45],"of":[46,64,78,95,115,124,144,182,192],"dependency":[48],"graphs":[49],"among":[50],"system":[51,65,70],"objects,":[52],"scalability":[53,93],"can":[54,171],"easily":[55],"become":[56],"an":[57,88,177],"issue":[58,94],"due":[59],"overwhelming":[62],"amount":[63],"level":[66],"activities.":[67],"As":[68],"more":[69],"calls":[71],"collected":[73],"over":[74],"time,":[75],"size":[77],"network":[81,98,148,179,196],"will":[82],"increase":[83],"drastically.":[84],"Therefore,":[85],"we":[86],"propose":[87],"approach":[89],"address":[91],"when":[99],"using":[100],"it":[101],"identify":[103],"paths.This":[107],"paper":[108],"focuses":[109],"three":[111],"parts:":[112],"division":[114,143],"single":[117],"network,":[120],"virtual":[122],"connection":[123],"multiple":[125,168],"sub-Bayesian":[126,133],"networks,":[127],"inference":[131],"between":[132],"find":[136],"complete":[138],"paths.":[141,185],"The":[142,186],"into":[149],"smaller":[150],"parts":[151],"reduces":[152],"time":[154],"needed":[155],"calculate":[157],"probabilities":[158],"update":[160],"In":[164],"proposed":[166],"approach,":[167],"virtually":[172],"connect":[173],"entire":[178],"identification":[181],"experimental":[187],"results":[188],"demonstrate":[189],"effectiveness":[191],"this":[193],"scalable":[194],"approach.":[197]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
