{"id":"https://openalex.org/W2887561884","doi":"https://doi.org/10.1109/milcom.2018.8599708","title":"Multi-Stage Attack Detection Using Contextual Information","display_name":"Multi-Stage Attack Detection Using Contextual Information","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2887561884","doi":"https://doi.org/10.1109/milcom.2018.8599708","mag":"2887561884"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2018.8599708","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Multi-stage_attack_detection_using_contextual_information/9556910/1/files/17188808.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043400886","display_name":"Francisco J. Aparicio\u2010Navarro","orcid":"https://orcid.org/0000-0002-1511-7805"},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"funder","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Franciso J. Aparicio-Navarro","raw_affiliation_strings":["Faculty of Technology, De Montfort University, Leicester, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Technology, De Montfort University, Leicester, UK","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046799023","display_name":"Konstantinos G. Kyriakopoulos","orcid":"https://orcid.org/0000-0002-7498-4589"},"institutions":[{"id":"https://openalex.org/I143804889","display_name":"Loughborough University","ror":"https://ror.org/04vg4w365","country_code":"GB","type":"funder","lineage":["https://openalex.org/I143804889"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Konstantinos G. Kyriakopoulos","raw_affiliation_strings":["Institute for Digital Technologies, Loughborough University London, London, UK"],"affiliations":[{"raw_affiliation_string":"Institute for Digital Technologies, Loughborough University London, London, UK","institution_ids":["https://openalex.org/I143804889"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055981395","display_name":"Ibrahim Ghafir","orcid":"https://orcid.org/0000-0003-3702-3866"},"institutions":[{"id":"https://openalex.org/I143804889","display_name":"Loughborough University","ror":"https://ror.org/04vg4w365","country_code":"GB","type":"funder","lineage":["https://openalex.org/I143804889"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ibrahim Ghafir","raw_affiliation_strings":["Wolfson School of Engineering, Loughborough University, Loughborough, UK"],"affiliations":[{"raw_affiliation_string":"Wolfson School of Engineering, Loughborough University, Loughborough, UK","institution_ids":["https://openalex.org/I143804889"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009232291","display_name":"Sangarapillai Lambotharan","orcid":"https://orcid.org/0000-0001-5255-7036"},"institutions":[{"id":"https://openalex.org/I143804889","display_name":"Loughborough University","ror":"https://ror.org/04vg4w365","country_code":"GB","type":"funder","lineage":["https://openalex.org/I143804889"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sangarapillai Lambotharan","raw_affiliation_strings":["Wolfson School of Engineering, Loughborough University, Loughborough, UK"],"affiliations":[{"raw_affiliation_string":"Wolfson School of Engineering, Loughborough University, Loughborough, UK","institution_ids":["https://openalex.org/I143804889"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083892296","display_name":"Jonathon A. Chambers","orcid":"https://orcid.org/0000-0002-5820-6509"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"funder","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jonathon A. Chambers","raw_affiliation_strings":["School of Engineering, Newcastle University, Newcastle upon Tyne, UK"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Newcastle University, Newcastle upon Tyne, UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.65,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":27,"citation_normalized_percentile":{"value":0.939739,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9901,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9748,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8405719},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.80297893},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.76743925},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6392431},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4584633},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3989444},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3717483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35896355},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32828754},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2018.8599708","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Multi-stage_attack_detection_using_contextual_information/9556910","pdf_url":"https://figshare.com/articles/conference_contribution/Multi-stage_attack_detection_using_contextual_information/9556910/1/files/17188808.pdf","source":{"id":"https://openalex.org/S4306402621","display_name":"INDIGO (University of Illinois at Chicago)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I39422238","host_organization_name":"University of Illinois Chicago","host_organization_lineage":["https://openalex.org/I39422238"],"host_organization_lineage_names":["University of Illinois Chicago"],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://dspace.lboro.ac.uk/2134/34219","pdf_url":"https://repository.lboro.ac.uk/articles/conference_contribution/Multi-stage_attack_detection_using_contextual_information/9556910/1/files/17188808.pdf","source":{"id":"https://openalex.org/S4306401023","display_name":"Loughborough University Institutional Repository (Loughborough University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I143804889","host_organization_name":"Loughborough University","host_organization_lineage":["https://openalex.org/I143804889"],"host_organization_lineage_names":["Loughborough University"],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"acceptedVersion","is_accepted":true,"is_published":false},{"is_oa":true,"landing_page_url":"http://hdl.handle.net/2086/17136","pdf_url":"https://dora.dmu.ac.uk/bitstreams/fba66b90-3ff9-4627-800b-47a093cccc5c/download","source":{"id":"https://openalex.org/S4306400394","display_name":"DMU Open Research Archive (De Montfort University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I66943878","host_organization_name":"De Montfort University","host_organization_lineage":["https://openalex.org/I66943878"],"host_organization_lineage_names":["De Montfort University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://eprint.ncl.ac.uk/fulltext.aspx?url=255380/C12DC6C5-D98B-478B-B408-A89518A8E210.pdf&pub_id=255380","pdf_url":"https://eprint.ncl.ac.uk/fulltext.aspx?url=255380/C12DC6C5-D98B-478B-B408-A89518A8E210.pdf&pub_id=255380","source":{"id":"https://openalex.org/S4306402485","display_name":"Newcastle University ePrints (Newcastle Univesity)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I84884186","host_organization_name":"Newcastle University","host_organization_lineage":["https://openalex.org/I84884186"],"host_organization_lineage_names":["Newcastle University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Multi-stage_attack_detection_using_contextual_information/9556910","pdf_url":"https://figshare.com/articles/conference_contribution/Multi-stage_attack_detection_using_contextual_information/9556910/1/files/17188808.pdf","source":{"id":"https://openalex.org/S4306402621","display_name":"INDIGO (University of Illinois at Chicago)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I39422238","host_organization_name":"University of Illinois Chicago","host_organization_lineage":["https://openalex.org/I39422238"],"host_organization_lineage_names":["University of Illinois Chicago"],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.62}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1642882198","https://openalex.org/W1922327879","https://openalex.org/W1968729336","https://openalex.org/W1974036924","https://openalex.org/W1987611741","https://openalex.org/W2004254965","https://openalex.org/W2100883540","https://openalex.org/W2127025275","https://openalex.org/W2133268230","https://openalex.org/W2142839897","https://openalex.org/W2152183345","https://openalex.org/W2182819203","https://openalex.org/W2188123729","https://openalex.org/W2290880970","https://openalex.org/W2505030271","https://openalex.org/W2624592324","https://openalex.org/W2766725984","https://openalex.org/W2797148637","https://openalex.org/W2814139629","https://openalex.org/W2818789173","https://openalex.org/W4301347335"],"related_works":["https://openalex.org/W4312814274","https://openalex.org/W3207760230","https://openalex.org/W2536018345","https://openalex.org/W2364419519","https://openalex.org/W2360951146","https://openalex.org/W2360767377","https://openalex.org/W2017948608","https://openalex.org/W17155033","https://openalex.org/W1590307681","https://openalex.org/W1496222301"],"abstract_inverted_index":{"The":[0,91],"appearance":[1],"of":[2,5,42,65,94,102,114,127,133,141],"new":[3,13],"forms":[4],"cyber-threats,":[6],"such":[7],"as":[8,112],"Multi-Stage":[9],"Attacks":[10],"(MSAs),":[11],"creates":[12],"challenges":[14],"to":[15,21,71,98],"which":[16,31,108],"Intrusion":[17],"Detection":[18],"Systems":[19],"(IDSs)need":[20],"adapt.":[22],"An":[23],"MSA":[24,96],"is":[25,97],"launched":[26],"in":[27,62,85,143],"multiple":[28],"sequential":[29],"stages,":[30],"may":[32],"not":[33],"be":[34,110],"malicious":[35],"when":[36],"implemented":[37],"individually,":[38],"making":[39],"the":[40,63,75,95,125,131,138],"detection":[41,139],"MSAs":[43,142],"extremely":[44],"challenging":[45],"for":[46],"most":[47],"current":[48],"IDSs.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53],"present":[54],"a":[55,100,105],"novel":[56],"IDS":[57,79,135],"that":[58,124],"exploits":[59],"contextual":[60,128],"information":[61,69,129],"form":[64],"Pattern-of-Life":[66],"(PoL),":[67],"and":[68],"related":[70],"expert":[72],"judgment":[73],"on":[74,81],"network":[76],"behaviour.":[77],"This":[78],"focuses":[80],"detecting":[82],"an":[83,115],"MSA,":[84],"real-time,":[86],"without":[87],"previous":[88],"training":[89],"process.":[90],"main":[92],"goal":[93],"create":[99],"Point":[101],"Entry":[103],"(PoE)to":[104],"target":[106],"machine,":[107],"could":[109],"used":[111],"part":[113],"Advanced":[116],"Persistent":[117],"Threat":[118],"(APT)like":[119],"attack.":[120],"Our":[121],"results":[122],"verify":[123],"use":[126],"improves":[130],"efficiency":[132],"our":[134],"by":[136,145],"enhancing":[137],"rate":[140],"real-time":[144],"58%.":[146]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2887561884","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4}],"updated_date":"2025-04-20T10:34:46.479578","created_date":"2018-08-22"}