{"id":"https://openalex.org/W4405153167","doi":"https://doi.org/10.1145/3686852.3686860","title":"An Empirical Study Using Microsoft Azure Auto Machine Learning to Detect Zero-Day Attacks","display_name":"An Empirical Study Using Microsoft Azure Auto Machine Learning to Detect Zero-Day Attacks","publication_year":2024,"publication_date":"2024-10-10","ids":{"openalex":"https://openalex.org/W4405153167","doi":"https://doi.org/10.1145/3686852.3686860"},"language":"en","primary_location":{"id":"doi:10.1145/3686852.3686860","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3686852.3686860","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 25th Annual Conference on Information Technology Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3686852.3686860","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115048511","display_name":"Joy Buuri","orcid":null},"institutions":[{"id":"https://openalex.org/I8606887","display_name":"Grand Valley State University","ror":"https://ror.org/001m1hv61","country_code":"US","type":"education","lineage":["https://openalex.org/I8606887"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Joy Buuri","raw_affiliation_strings":["Grand Valley State University, United States"],"raw_orcid":"https://orcid.org/0009-0000-7135-8884","affiliations":[{"raw_affiliation_string":"Grand Valley State University, United States","institution_ids":["https://openalex.org/I8606887"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113687217","display_name":"Samah Mansour","orcid":null},"institutions":[{"id":"https://openalex.org/I8606887","display_name":"Grand Valley State University","ror":"https://ror.org/001m1hv61","country_code":"US","type":"education","lineage":["https://openalex.org/I8606887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Samah Mansour","raw_affiliation_strings":["Grand Valley State University, United States"],"raw_orcid":"https://orcid.org/0009-0001-6284-7472","affiliations":[{"raw_affiliation_string":"Grand Valley State University, United States","institution_ids":["https://openalex.org/I8606887"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053878215","display_name":"Mostafa El-Said","orcid":"https://orcid.org/0000-0002-0368-7851"},"institutions":[{"id":"https://openalex.org/I8606887","display_name":"Grand Valley State University","ror":"https://ror.org/001m1hv61","country_code":"US","type":"education","lineage":["https://openalex.org/I8606887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa El-Said","raw_affiliation_strings":["Grand Valley State University, United States"],"raw_orcid":"https://orcid.org/0000-0002-0368-7851","affiliations":[{"raw_affiliation_string":"Grand Valley State University, United States","institution_ids":["https://openalex.org/I8606887"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041131439","display_name":"Xinli Wang","orcid":"https://orcid.org/0009-0007-0939-237X"},"institutions":[{"id":"https://openalex.org/I8606887","display_name":"Grand Valley State University","ror":"https://ror.org/001m1hv61","country_code":"US","type":"education","lineage":["https://openalex.org/I8606887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinli Wang","raw_affiliation_strings":["Grand Valley State University, United States"],"raw_orcid":"https://orcid.org/0009-0007-0939-237X","affiliations":[{"raw_affiliation_string":"Grand Valley State University, United States","institution_ids":["https://openalex.org/I8606887"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115048511"],"corresponding_institution_ids":["https://openalex.org/I8606887"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19910758,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"7","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6753895878791809},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.571711003780365},{"id":"https://openalex.org/keywords/microsoft-excel","display_name":"Microsoft excel","score":0.45430877804756165},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4425007402896881},{"id":"https://openalex.org/keywords/microsoft-office","display_name":"Microsoft Office","score":0.4389049708843231},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3436492681503296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6753895878791809},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.571711003780365},{"id":"https://openalex.org/C3019730874","wikidata":"https://www.wikidata.org/wiki/Q11272","display_name":"Microsoft excel","level":2,"score":0.45430877804756165},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4425007402896881},{"id":"https://openalex.org/C523788702","wikidata":"https://www.wikidata.org/wiki/Q11255","display_name":"Microsoft Office","level":2,"score":0.4389049708843231},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3436492681503296},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3686852.3686860","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3686852.3686860","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 25th Annual Conference on Information Technology Education","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3686852.3686860","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3686852.3686860","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 25th Annual Conference on Information Technology Education","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W3202908052","https://openalex.org/W4379057025","https://openalex.org/W4382583148","https://openalex.org/W4385445495","https://openalex.org/W4387746080","https://openalex.org/W4391156757","https://openalex.org/W4391996658","https://openalex.org/W4392912249","https://openalex.org/W4393217316"],"related_works":["https://openalex.org/W2743405062","https://openalex.org/W3207423906","https://openalex.org/W4213258522","https://openalex.org/W2751465666","https://openalex.org/W2011504649","https://openalex.org/W2471287801","https://openalex.org/W1524167041","https://openalex.org/W3128982586","https://openalex.org/W4389924389","https://openalex.org/W566267907"],"abstract_inverted_index":{"Evolving":[0],"zero-day":[1,34,60,124],"attacks":[2,35],"in":[3,27,122],"network":[4,16],"security":[5,19],"pose":[6],"a":[7],"significant":[8],"challenge,":[9],"as":[10],"they":[11],"remain":[12],"unknown":[13],"to":[14,32,45,52,65,106,113],"the":[15,56,84,115,128],"systems":[17],"and":[18,43,76,96,103,117,134,137,144],"professionals,":[20],"rendering":[21],"them":[22],"exceptionally":[23],"hazardous.":[24],"Despite":[25],"advancements":[26],"cybersecurity":[28],"technologies,":[29],"existing":[30],"approaches":[31,70],"combating":[33],"often":[36],"face":[37],"limitations":[38],"regarding":[39],"predictive":[40],"accuracy,":[41],"scalability,":[42],"adaptability":[44],"evolving":[46],"threats.":[47,108],"Traditional":[48],"models":[49,75],"may":[50,71],"struggle":[51],"keep":[53],"pace":[54],"with":[55],"dynamic":[57,93],"nature":[58],"of":[59,86,119],"attacks,":[61],"leaving":[62],"organizations":[63],"vulnerable":[64],"exploitation.":[66],"Additionally,":[67],"traditional":[68],"machine-learning":[69],"rely":[72],"on":[73],"static":[74],"manual":[77],"tuning.":[78],"In":[79],"this":[80],"paper,":[81],"we":[82],"harness":[83],"power":[85],"Microsoft":[87],"Azure":[88,120],"automated":[89],"machine":[90],"learning":[91,94],"(AutoML)'s":[92],"capabilities":[95],"adaptive":[97],"responses":[98],"for":[99],"seamless":[100],"model":[101,147],"deployment":[102],"continuous":[104],"adaptation":[105],"emerging":[107],"Experimental":[109],"analysis":[110],"was":[111],"conducted":[112],"evaluate":[114],"accuracy":[116],"effectiveness":[118],"AutoML":[121,146],"detecting":[123],"anomalies.":[125],"We":[126],"measure":[127],"model's":[129],"performance":[130],"through":[131],"multiple":[132],"datasets":[133],"rigorous":[135],"testing":[136],"validation":[138],"processes,":[139],"including":[140],"precision,":[141],"recall,":[142],"F-measure,":[143],"overall":[145],"accuracy.":[148]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
