{"id":"https://openalex.org/W2740080807","doi":"https://doi.org/10.5220/0005013800190030","title":"Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions","display_name":"Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2740080807","doi":"https://doi.org/10.5220/0005013800190030","mag":"2740080807"},"language":"en","primary_location":{"id":"doi:10.5220/0005013800190030","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005013800190030","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005013800190030","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081115472","display_name":"Paulo Shakarian","orcid":"https://orcid.org/0000-0002-3159-4660"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Paulo Shakarian","raw_affiliation_strings":["Arizona State University, United States"],"affiliations":[{"raw_affiliation_string":"Arizona State University, United States","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037065294","display_name":"Damon Paulo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Damon Paulo","raw_affiliation_strings":["U.S. Military Academy, United States"],"affiliations":[{"raw_affiliation_string":"U.S. Military Academy, United States","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066709657","display_name":"Massimiliano Albanese","orcid":"https://orcid.org/0000-0002-2675-5810"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Massimiliano Albanese","raw_affiliation_strings":["George Mason University, United States"],"affiliations":[{"raw_affiliation_string":"George Mason University, United States","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]},{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["George Mason University and The MITRE Corporation, United States"],"affiliations":[{"raw_affiliation_string":"George Mason University and The MITRE Corporation, United States","institution_ids":["https://openalex.org/I44896327","https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081115472"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.3657164,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8150889277458191},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.6587822437286377},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.604000449180603},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5527763962745667},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5500168800354004},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4909522831439972},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4824264943599701},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.45595598220825195},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4363490045070648},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4190441966056824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2734711468219757},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18764662742614746}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8150889277458191},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.6587822437286377},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.604000449180603},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5527763962745667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5500168800354004},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4909522831439972},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4824264943599701},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.45595598220825195},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4363490045070648},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4190441966056824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2734711468219757},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18764662742614746},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005013800190030","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005013800190030","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005013800190030","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005013800190030","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W4230913293","https://openalex.org/W2166943775","https://openalex.org/W2775236000","https://openalex.org/W2073762068","https://openalex.org/W2312996858","https://openalex.org/W2392120181","https://openalex.org/W2307276533","https://openalex.org/W2390124310"],"abstract_inverted_index":{"It":[0],"is":[1],"well":[2],"known":[3],"that":[4,31,61,144],"not":[5],"all":[6],"intrusions":[7],"can":[8],"be":[9,136],"prevented":[10],"and":[11,47,87,125,138],"additional":[12],"lines":[13],"of":[14,72,92,107,114,158],"defense":[15],"are":[16],"needed":[17],"to":[18,57,119,135],"deal":[19],"with\r\n\r\nintruders.":[20],"However,":[21],"most":[22],"current":[23],"approaches":[24],"use":[25],"honeynets":[26],"relying":[27],"on":[28,77,155],"the":[29,38,59,82,93,115,123,159],"assumption":[30],"simply":[32],"attracting\r\n\r\nintruders":[33],"into":[34],"honeypots":[35],"would":[36],"thwart":[37],"attack.":[39],"In":[40],"this":[41,99,130],"paper,":[42],"we":[43,150],"propose":[44],"a":[45,69,79,156],"different":[46],"more":[48],"realistic\r\n\r\napproach,":[49],"which":[50],"aims":[51],"at":[52,111],"delaying":[53],"intrusions,":[54],"so":[55],"as":[56],"control":[58],"probability":[60],"an":[62,88,141],"intruder":[63],"will":[64],"reach":[65],"a\r\n\r\ncertain":[66],"goal":[67],"within":[68],"specified":[70],"amount":[71],"time.":[73],"Our":[74],"method":[75],"relies":[76],"analyzing":[78],"graphical":[80],"representation\r\n\r\nof":[81],"computer":[83],"network\u00e2\u0080\u0099s":[84],"logical":[85],"layout":[86],"associated":[89],"probabilistic":[90],"model":[91],"adversary\u00e2\u0080\u0099s":[94],"behavior.\r\n\r\nWe":[95],"then":[96,139],"artificially":[97],"modify":[98],"representation":[100],"by":[101],"adding":[102],"\u00e2\u0080\u009cdistraction":[103],"clusters\u00e2\u0080\u009d":[104],"\u00e2\u0080\u0093":[105,110],"collections":[106],"interconnected\r\n\r\nvirtual":[108],"machines":[109],"key":[112],"points":[113],"network":[116],"in":[117],"order":[118],"increase":[120],"complexity":[121],"for":[122],"intruders":[124],"delay":[126],"the\r\n\r\nintrusion.":[127],"We":[128],"study":[129],"problem":[131],"formally,":[132],"showing":[133],"it":[134],"NP-hard":[137],"provide":[140],"approximation":[142],"algo-\r\n\r\nrithm":[143],"exhibits":[145],"several":[146],"useful":[147],"properties.":[148],"Finally,":[149],"present":[151],"experimental":[152],"results":[153],"obtained":[154],"prototypal\r\n\r\nimplementation":[157],"proposed":[160],"framework.":[161]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
