{"id":"https://openalex.org/W3000501050","doi":"https://doi.org/10.1145/3368860.3368862","title":"Employing attack graphs for intrusion detection","display_name":"Employing attack graphs for intrusion detection","publication_year":2019,"publication_date":"2019-09-23","ids":{"openalex":"https://openalex.org/W3000501050","doi":"https://doi.org/10.1145/3368860.3368862","mag":"3000501050"},"language":"en","primary_location":{"id":"doi:10.1145/3368860.3368862","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368860.3368862","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368860.3368862","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the New Security Paradigms Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3368860.3368862","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040849462","display_name":"Frank Capobianco","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Frank Capobianco","raw_affiliation_strings":["Penn State University"],"affiliations":[{"raw_affiliation_string":"Penn State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091402540","display_name":"Rahul George","orcid":"https://orcid.org/0000-0002-6683-6164"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rahul George","raw_affiliation_strings":["Penn State University"],"affiliations":[{"raw_affiliation_string":"Penn State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072113393","display_name":"Kaiming Huang","orcid":"https://orcid.org/0000-0003-3665-2687"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaiming Huang","raw_affiliation_strings":["Penn State University"],"affiliations":[{"raw_affiliation_string":"Penn State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055045569","display_name":"Trent Jaeger","orcid":"https://orcid.org/0000-0002-4964-1170"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Trent Jaeger","raw_affiliation_strings":["Penn State University"],"affiliations":[{"raw_affiliation_string":"Penn State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086268637","display_name":"Srikanth V. Krishnamurthy","orcid":"https://orcid.org/0000-0002-6533-4381"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srikanth Krishnamurthy","raw_affiliation_strings":["UC Riverside"],"affiliations":[{"raw_affiliation_string":"UC Riverside","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022038961","display_name":"Zhiyun Qian","orcid":"https://orcid.org/0000-0003-1506-2522"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiyun Qian","raw_affiliation_strings":["UC Riverside"],"affiliations":[{"raw_affiliation_string":"UC Riverside","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065116578","display_name":"Mathias Payer","orcid":"https://orcid.org/0000-0001-5054-7547"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Mathias Payer","raw_affiliation_strings":["Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne"],"affiliations":[{"raw_affiliation_string":"Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000981358","display_name":"Paul Yu","orcid":"https://orcid.org/0000-0003-1577-3914"},"institutions":[{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Yu","raw_affiliation_strings":["U.S. Army Combat Capabilities Development Command Army Research Laboratory"],"affiliations":[{"raw_affiliation_string":"U.S. Army Combat Capabilities Development Command Army Research Laboratory","institution_ids":["https://openalex.org/I2802705668"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5040849462"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":1.2999,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.83205837,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"16","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8034635782241821},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7285153865814209},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7008402347564697},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6138750910758972},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5306258201599121},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.5163484811782837},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5152059197425842},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4242214560508728},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.41659867763519287},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0954708456993103}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8034635782241821},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7285153865814209},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7008402347564697},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6138750910758972},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5306258201599121},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.5163484811782837},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5152059197425842},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4242214560508728},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.41659867763519287},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0954708456993103}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3368860.3368862","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368860.3368862","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368860.3368862","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the New Security Paradigms Workshop","raw_type":"proceedings-article"},{"id":"pmh:ark:/13030/qt10n5p134","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null},{"id":"pmh:oai:escholarship.org:ark:/13030/qt10n5p134","is_oa":true,"landing_page_url":"https://escholarship.org/uc/item/10n5p134","pdf_url":null,"source":{"id":"https://openalex.org/S4306400115","display_name":"eScholarship (California Digital Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801248553","host_organization_name":"California Digital Library","host_organization_lineage":["https://openalex.org/I2801248553"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:infoscience.epfl.ch:279429","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/170906","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"WoS","raw_type":"conference proceedings"}],"best_oa_location":{"id":"doi:10.1145/3368860.3368862","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368860.3368862","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368860.3368862","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the New Security Paradigms Workshop","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G682598287","display_name":null,"funder_award_id":"CNS-1801534, CNS-1801601","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338456","display_name":"DEVCOM Army Research Laboratory","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3000501050.pdf","grobid_xml":"https://content.openalex.org/works/W3000501050.grobid-xml"},"referenced_works_count":87,"referenced_works":["https://openalex.org/W109911468","https://openalex.org/W154231405","https://openalex.org/W193500057","https://openalex.org/W1444906800","https://openalex.org/W1512458425","https://openalex.org/W1515452738","https://openalex.org/W1516506771","https://openalex.org/W1518431406","https://openalex.org/W1602325706","https://openalex.org/W1674877186","https://openalex.org/W1717064016","https://openalex.org/W1745181983","https://openalex.org/W1787327377","https://openalex.org/W1904738922","https://openalex.org/W1974715273","https://openalex.org/W1975197166","https://openalex.org/W1985987493","https://openalex.org/W2009232481","https://openalex.org/W2011505318","https://openalex.org/W2016663803","https://openalex.org/W2025113626","https://openalex.org/W2032493761","https://openalex.org/W2048465382","https://openalex.org/W2051990174","https://openalex.org/W2053741629","https://openalex.org/W2054127354","https://openalex.org/W2056073317","https://openalex.org/W2070425304","https://openalex.org/W2075663494","https://openalex.org/W2083270195","https://openalex.org/W2083658929","https://openalex.org/W2084044852","https://openalex.org/W2086234010","https://openalex.org/W2094873755","https://openalex.org/W2101438812","https://openalex.org/W2106188980","https://openalex.org/W2110012131","https://openalex.org/W2111487235","https://openalex.org/W2113709047","https://openalex.org/W2117217919","https://openalex.org/W2121805588","https://openalex.org/W2122269808","https://openalex.org/W2129586531","https://openalex.org/W2131875370","https://openalex.org/W2136296832","https://openalex.org/W2139249028","https://openalex.org/W2141867896","https://openalex.org/W2150802402","https://openalex.org/W2152449272","https://openalex.org/W2155851497","https://openalex.org/W2158126684","https://openalex.org/W2159059513","https://openalex.org/W2162283517","https://openalex.org/W2169476734","https://openalex.org/W2180612164","https://openalex.org/W2199318523","https://openalex.org/W2211371252","https://openalex.org/W2397699236","https://openalex.org/W2512784977","https://openalex.org/W2516574342","https://openalex.org/W2612168751","https://openalex.org/W2750917225","https://openalex.org/W2761942534","https://openalex.org/W2762390651","https://openalex.org/W2764249719","https://openalex.org/W2768553818","https://openalex.org/W2771587641","https://openalex.org/W2807656656","https://openalex.org/W2889280832","https://openalex.org/W2890196927","https://openalex.org/W2914982603","https://openalex.org/W2932687117","https://openalex.org/W2963207607","https://openalex.org/W2963622436","https://openalex.org/W2963807402","https://openalex.org/W2963934162","https://openalex.org/W2999271630","https://openalex.org/W3106149149","https://openalex.org/W4206109607","https://openalex.org/W4214931895","https://openalex.org/W4229749093","https://openalex.org/W4234020632","https://openalex.org/W4242358766","https://openalex.org/W4248587618","https://openalex.org/W4302784197","https://openalex.org/W4387298299","https://openalex.org/W6685177392"],"related_works":["https://openalex.org/W2588995807","https://openalex.org/W4390187619","https://openalex.org/W2591273803","https://openalex.org/W2604394466","https://openalex.org/W2952603690","https://openalex.org/W4387796593","https://openalex.org/W2941205169","https://openalex.org/W3081645608","https://openalex.org/W4328053081","https://openalex.org/W4312119938"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,46,271],"systems":[2,47],"are":[3],"a":[4,264],"commonly":[5],"deployed":[6],"defense":[7],"that":[8,85,135,154,167,172],"examines":[9],"network":[10],"traffic,":[11],"host":[12],"operations,":[13],"or":[14],"both":[15],"to":[16,57,70,106,125,130,148,165,195,227,231],"detect":[17,131],"attacks.":[18],"However,":[19],"more":[20],"attacks":[21,32,51,72,90,110,121,200,210,216],"bypass":[22],"IDS":[23],"defenses":[24],"each":[25,159],"year,":[26],"and":[27,61,178,208,236],"with":[28,170],"the":[29,63,78,97,137,189,238],"sophistication":[30],"of":[31,80,99,119,133,240],"increasing":[33],"as":[34,205,215],"well,":[35],"we":[36,83,123,145,224,249,254],"must":[37],"examine":[38,146],"new":[39,59],"perspectives":[40],"for":[41,139,158,243,267],"intrusion":[42,45,81,270],"detection.":[43],"Current":[44],"focus":[48],"on":[49,201,217],"known":[50,116],"and/or":[52],"vulnerabilities,":[53],"limiting":[54],"their":[55],"ability":[56],"identify":[58,250],"attacks,":[60,207],"lack":[62],"visibility":[64],"into":[65],"all":[66],"system":[67,93],"components":[68],"necessary":[69],"confirm":[71],"accurately,":[73],"particularly":[74],"programs.":[75],"To":[76],"change":[77],"landscape":[79],"detection,":[82],"propose":[84,124],"future":[86,269],"IDSs":[87],"track":[88],"how":[89,108,147,226],"evolve":[91],"across":[92],"layers":[94],"by":[95,114,192],"adapting":[96],"concept":[98],"attack":[100,127,151,163,176,185,233,246,260],"graphs.":[101,247],"Attack":[102],"graphs":[103,128,152,234,261],"were":[104],"proposed":[105,190],"study":[107],"multi-stage":[109],"could":[111],"be":[112],"launched":[113],"exploiting":[115],"vulnerabilities.":[117,219],"Instead":[118],"constructing":[120],"reactively,":[122],"apply":[126],"proactively":[129],"sequences":[132],"events":[134],"fulfill":[136],"requirements":[138],"vulnerability":[140],"exploitation.":[141],"Using":[142],"this":[143],"insight,":[144],"generate":[149],"modular":[150],"automatically":[153,235],"relate":[155],"adversary":[156],"accessibility":[157],"component,":[160],"called":[161,175,184],"its":[162],"surface,":[164],"flaws":[166],"provide":[168,263],"adversaries":[169],"permissions":[171],"create":[173],"threats,":[174,183],"states,":[177],"exploit":[179],"operations":[180],"from":[181],"those":[182],"actions.":[186],"We":[187],"evaluate":[188],"approach":[191],"applying":[193],"it":[194],"two":[196],"case":[197,222],"studies:":[198],"(1)":[199],"file":[202],"retrieval,":[203],"such":[204,214],"TOCTTOU":[206],"(2)":[209],"propagated":[211],"among":[212],"processes,":[213],"Shell-shock":[218],"In":[220],"these":[221,241],"studies,":[223],"demonstrate":[225],"leverage":[228],"existing":[229],"tools":[230,242],"compute":[232],"assess":[237],"effectiveness":[239],"building":[244],"complete":[245],"While":[248],"some":[251],"research":[252],"areas,":[253],"also":[255],"find":[256],"several":[257],"reasons":[258],"why":[259],"can":[262],"valuable":[265],"foundation":[266],"improving":[268],"systems.":[272]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
