{"id":"https://openalex.org/W4285276666","doi":"https://doi.org/10.5220/0011077100003179","title":"Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools","display_name":"Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285276666","doi":"https://doi.org/10.5220/0011077100003179"},"language":"en","primary_location":{"id":"doi:10.5220/0011077100003179","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011077100003179","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0011077100003179","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044238599","display_name":"Nestori Syynimaa","orcid":"https://orcid.org/0000-0002-6848-094X"},"institutions":[{"id":"https://openalex.org/I94722563","display_name":"University of Jyv\u00e4skyl\u00e4","ror":"https://ror.org/05n3dz165","country_code":"FI","type":"education","lineage":["https://openalex.org/I94722563"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Nestori Syynimaa","raw_affiliation_strings":["Secureworks, Counter Threat Unit, U.S.A. Faculty of Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Secureworks, Counter Threat Unit, U.S.A. Faculty of Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland, --- Select a Country ---","institution_ids":["https://openalex.org/I94722563"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5044238599"],"corresponding_institution_ids":["https://openalex.org/I94722563"],"apc_list":null,"apc_paid":null,"fwci":1.212,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83233041,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"142","last_page":"147"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9726999998092651,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/directory","display_name":"Directory","score":0.7924524545669556},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.730984091758728},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5765836238861084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5580412149429321},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4956454038619995},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4706546366214752},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.4563387930393219},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4443580210208893},{"id":"https://openalex.org/keywords/directory-service","display_name":"Directory service","score":0.4335457980632782}],"concepts":[{"id":"https://openalex.org/C2777683733","wikidata":"https://www.wikidata.org/wiki/Q201456","display_name":"Directory","level":2,"score":0.7924524545669556},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.730984091758728},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5765836238861084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5580412149429321},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4956454038619995},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4706546366214752},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.4563387930393219},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4443580210208893},{"id":"https://openalex.org/C138338577","wikidata":"https://www.wikidata.org/wiki/Q756230","display_name":"Directory service","level":3,"score":0.4335457980632782},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0011077100003179","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011077100003179","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:jyx.jyu.fi:123456789/85747","is_oa":false,"landing_page_url":"http://urn.fi/URN:NBN:fi:jyu-202303032006","pdf_url":null,"source":{"id":"https://openalex.org/S4306400563","display_name":"Jyv\u00e4skyl\u00e4 University Digital Archive (University of Jyv\u00e4skyl\u00e4)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I94722563","host_organization_name":"University of Jyv\u00e4skyl\u00e4","host_organization_lineage":["https://openalex.org/I94722563"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"A4"}],"best_oa_location":{"id":"doi:10.5220/0011077100003179","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011077100003179","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W1997816329"],"related_works":["https://openalex.org/W181118223","https://openalex.org/W73423766","https://openalex.org/W2106753613","https://openalex.org/W2104608056","https://openalex.org/W2005960013","https://openalex.org/W2143307242","https://openalex.org/W2136877416","https://openalex.org/W2767128237","https://openalex.org/W2160164485","https://openalex.org/W2039577318"],"abstract_inverted_index":{"Azure":[0,51,101],"Active":[1],"Directory":[2],"(Azure":[3],"AD)":[4],"is":[5,46,60],"Microsoft\u2019s":[6],"identity":[7],"and":[8,22,66,81,85,103],"access":[9],"management":[10],"service":[11],"used":[12,77],"globally":[13],"by":[14,28,35,78,118],"90":[15],"per":[16],"cent":[17],"of":[18,88,106],"Fortune":[19,63],"500":[20,64],"companies":[21,65],"many":[23],"other":[24],"organisations.":[25],"Recent":[26],"attacks":[27,117],"nation-state":[29,119],"adversaries":[30],"have":[31],"targeted":[32],"these":[33,107],"organisations":[34,49,98,108],"exploiting":[36],"known":[37],"attack":[38,57],"vectors.":[39],"In":[40],"this":[41],"paper,":[42],"open-source":[43],"intelligence":[44],"(OSINT)":[45],"gathered":[47],"from":[48,62],"using":[50,100,110],"AD":[52,102],"to":[53],"explore":[54],"the":[55,79,82,89,115],"current":[56],"surface.":[58],"OSINT":[59,73],"collected":[61,72],"top":[67],"2000":[68],"universities":[69],"globally.":[70],"The":[71,93],"includes":[74],"authentication":[75,111],"methods":[76,112],"organisation":[80],"full":[83],"name":[84],"phone":[86],"number":[87],"primary":[90],"technical":[91],"contact.":[92],"findings":[94],"reveal":[95],"that":[96,104],"most":[97],"are":[99,109],"majority":[105],"exploited":[113],"during":[114],"recent":[116],"adversaries.":[120]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
