2023
DOI: 10.1109/access.2023.3244490
|View full text |Cite
|
Sign up to set email alerts
|

A Methodological Framework for AI-Assisted Security Assessments of Active Directory Environments

Abstract: The pervasiveness of complex technological infrastructures and services coupled with the continuously evolving threat landscape poses new sophisticated security risks. These risks are mostly associated with many diverse vulnerabilities related to software or hardware security flaws, misconfigurations and operational weaknesses. In this scenario, a timely assessment and mitigation of the security risks affecting technological environments are of paramount importance. To cope with these compelling issues, we pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 49 publications
0
4
0
Order By: Relevance
“…Graph-based techniques and clustering also play a signi cant role in security assessments. In active directory environments, a methodological framework integrating graph-based and ML techniques effectively assesses security risks by classifying network vulnerabilities based on complex interdependencies and miscon gurations (Article [131]). In the IoT domain, the MPIC model addresses privacy risks by predicting and mitigating the aggregation of PII across IoT devices (Article [80]).…”
Section: Probabilistic Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Graph-based techniques and clustering also play a signi cant role in security assessments. In active directory environments, a methodological framework integrating graph-based and ML techniques effectively assesses security risks by classifying network vulnerabilities based on complex interdependencies and miscon gurations (Article [131]). In the IoT domain, the MPIC model addresses privacy risks by predicting and mitigating the aggregation of PII across IoT devices (Article [80]).…”
Section: Probabilistic Methodsmentioning
confidence: 99%
“…[85], [150], [102], [126], [158] Vulnerability Classi cation [112], [131], [76], [117] Vulnerability Impact Analysis [199], [66], [99] Vulnerability Analytics [139], [9], [41], [77], [128] Risk Assessment Comprehensive Risk Assessment Framework [23], [48], [95], [175], [5], [22], [75], [62], [179], [122] Quantitative Risk Analysis [176], [65], [192], [7], [196], [195], [89], [189] Risk Classi cation and Prioritization [143], [194], [8] Automated and Dynamic Risk Analysis…”
Section: Predictive Vulnerability Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, in vulnerability assessment and management, AI-driven approaches streamline the process of identifying and prioritizing security vulnerabilities within complex IT environments [20]. By analyzing code repositories, system configurations, and historical attack data, AI can pinpoint exploitable weaknesses precisely, allowing organizations to allocate resources more effectively and proactively mitigate the most critical risks [21].…”
Section: Introductionmentioning
confidence: 99%