{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:42:16Z","timestamp":1743115336543,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031157769"},{"type":"electronic","value":"9783031157776"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_31","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"569-588","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dependency-Based Link Prediction for Learning Microsegmentation Policy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8540-0702","authenticated-orcid":false,"given":"Steven","family":"Noel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7892-4743","authenticated-orcid":false,"given":"Vipin","family":"Swarup","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Rose, S., Borchert, O., Mitchell, S., Connelly, S.: NIST special publication 800-207: zero trust architecture. National Institute of Standards and Technology, Gaithersburg, MD (2020)","DOI":"10.6028\/NIST.SP.800-207-draft2"},{"key":"31_CR2","unstructured":"Executive Order on Improving the Nation\u2019s Cybersecurity. https:\/\/www.whitehouse.gov\/ briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/. Accessed 2 Mar 2022"},{"key":"31_CR3","unstructured":"Miller, L., Soto, J.: Micro-segmentation for Dummies, VMware special edition. Wiley, Hoboken (2015)"},{"issue":"1","key":"31_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Kayes, A.S.M., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: an overview from machine learning perspective. J. Big Data 7(1), 1\u201329 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00318-5","journal-title":"J. Big Data"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018)","journal-title":"IEEE Access"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Golnabi, K., Min, R., Khan, L., Al-Shaer, E.: Analysis of firewall policy rules using data mining techniques. In: IEEE\/IFIP Network Operations and Management Symposium, Piscataway, NJ, pp. 305\u2013315. Institute of Electrical and Electronics Engineers (2006)","DOI":"10.1109\/NOMS.2006.1687561"},{"key":"31_CR7","unstructured":"Yousefi-Azar, M., Kaafar, M.A., Walker, A.: Unsupervised learning for security of enterprise networks by micro-segmentation. Preprint arXiv:2003.11231v1 (2020)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Arifeen, M., Petrovski, A., Petrovski, S.: Automated microsegmentation for lateral movement prevention in industrial internet of things (IIoT). In: International Conference on Security of Information and Networks, Piscataway, NJ, pp. 1\u20136. Institute of Electrical and Electronics Engineers (2021)","DOI":"10.1109\/SIN54109.2021.9699232"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Noel, S., Swarup, V., Johnsgard, K.: Optimizing network microsegmentation policy for cyber resilience. J. Defense Model. Simul. Spec. Issue Impact Anal. Cyber Defense Optim. 1\u201323 (2021)","DOI":"10.1177\/15485129211051386"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Basta, N., Ikram, M., Kaafar, M.A., Walker, A.: Towards a zero-trust micro-segmentation network security strategy: an evaluation framework. Preprint arXiv:2111.10967v1 (2021)","DOI":"10.1109\/NOMS54207.2022.9789888"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physa.2020.124289","volume":"553","author":"A Kumar","year":"2020","unstructured":"Kumar, A., Singh, S.S., Singh, K., Biswas, B.: Link prediction techniques, applications, and performance: a survey. Phys. A 553, 1\u201346 (2020)","journal-title":"Phys. A"},{"issue":"1","key":"31_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-014-5237-y","volume":"58","author":"P Wang","year":"2014","unstructured":"Wang, P., Xu, B., Wu, Y., Zhou, X.: Link prediction in social networks: the state-of-the-art. Sci. China Inf. Sci. 58(1), 1\u201338 (2014). https:\/\/doi.org\/10.1007\/s11432-014-5237-y","journal-title":"Sci. China Inf. Sci."},{"issue":"4","key":"31_CR13","doi-asserted-by":"publisher","first-page":"672","DOI":"10.3390\/make2040036","volume":"2","author":"EC Mutlu","year":"2020","unstructured":"Mutlu, E.C., Oghaz, T., Rajabi, A., Garibay, I.: Review on learning and extracting graph features for link prediction. Mach. Learn. Knowl. Extr. 2(4), 672\u2013704 (2020)","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Marjan, M., Zaki, N., Mohamed, E.A.: Link prediction in dynamic social networks: a literature review. In: IEEE International Congress on Information Science and Technology, Piscataway, NJ, pp. 200\u2013207. Institute of Electrical and Electronics Engineers (2018)","DOI":"10.1109\/CIST.2018.8596511"},{"key":"31_CR15","doi-asserted-by":"publisher","first-page":"22106","DOI":"10.1109\/ACCESS.2021.3055280","volume":"9","author":"S Georgousis","year":"2021","unstructured":"Georgousis, S., Kenning, M.P., Xie, X.: Graph deep learning: state of the art and challenges. IEEE Access 9, 22106\u201322140 (2021)","journal-title":"IEEE Access"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Katragadda, S., Gottumukkala, R., Pusala, M., Raghavan, V., Wojtkiewicz, J.: Distributed real time link prediction on graph streams. In: IEEE International Conference on Big Data, Piscataway, NJ, pp. 2912\u20132917. Institute of Electrical and Electronics Engineers (2018)","DOI":"10.1109\/BigData.2018.8621934"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Cai, L., Ji, S.: A multi-scale approach for graph link prediction. In: AAAI Conference on Artificial Intelligence, Palo Alto, CA, pp. 3308\u20133315. AAAI Press (2020)","DOI":"10.1609\/aaai.v34i04.5731"},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevResearch.2.042029","volume":"2","author":"A Aleta","year":"2020","unstructured":"Aleta, A., Tuninetti, M., Paolotti, D., Moreno, Y., Starnini, M.: Link prediction in multiplex networks via triadic closure. Phys. Rev. Res. 2, 1\u20136 (2020)","journal-title":"Phys. Rev. Res."},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Nassar, H., Benson, A.R., Gleich, D.F.: Pairwise link prediction. In: IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, New York, pp. 386\u2013393. Association for Computing Machinery (2019)","DOI":"10.1145\/3341161.3342897"},{"issue":"4","key":"31_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3012704","volume":"49","author":"V Mart\u00ednez","year":"2017","unstructured":"Mart\u00ednez, V., Berzal, F., Cubero, J.-C.: A survey of link prediction in complex networks. ACM Comput. Surv. 49(4), 1\u201333 (2017)","journal-title":"ACM Comput. Surv."},{"key":"31_CR21","doi-asserted-by":"publisher","first-page":"1634","DOI":"10.1145\/3319619.3326861","volume-title":"Genetic and Evolutionary Computation Conference Companion","author":"AS Pope","year":"2019","unstructured":"Pope, A.S., Tauritz, D.R., Turcotte, M.: Automated design of tailored link prediction heuristics for applications in enterprise network security. In: L\u00f3pez-Ib\u00e1\u00f1ez, M. (ed.) Genetic and Evolutionary Computation Conference Companion, pp. 1634\u20131642. Association for Computing Machinery, New York (2019)"},{"key":"31_CR22","unstructured":"Passino, F.S., Bertiger, A.S., Neil, J.C., Heard, N.A.: Link prediction in dynamic networks using random dot product graphs. arXiv:1912.10419 (2021)"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Eren, M.E., Moore, J.S., Alexandro, B.S.: Multi-dimensional anomalous entity detection via poisson tensor factorization. In: IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, pp. 1\u20136. Institute of Electrical and Electronics Engineers (2020)","DOI":"10.1109\/ISI49825.2020.9280524"},{"key":"31_CR24","unstructured":"Bowman, B., Laprade, C., Ji, Y., Huang, H.H.: Detecting lateral movement in enterprise computer networks with unsupervised graph AI. In: International Symposium on Research in Attacks, Intrusions and Defenses, pp. 257\u2013268. USENIX Association, Berkeley (2020)"},{"key":"31_CR25","unstructured":"Gupta, M., Fandli, J.G.: Automatically assigning labels to workloads while maintaining security boundaries. United States Patent 11,171,991, 9 November 2021"},{"key":"31_CR26","unstructured":"Hamou, C., Brouk, R., McAllister, S.: Micro-segmentation in virtualized computing environments. United States Patent 2017\/0374106, 28 December 2017"},{"key":"31_CR27","unstructured":"Hui, P., Huang, D., Peylo, C.: Method and system for link prediction in mobile computing. European Patent Office Patent EP 2 911 349, 24 February 2016"},{"key":"31_CR28","unstructured":"Choudhury, S., Agarwal, K., Chen, P.-Y., Ray, I.: System and methods for automated detection, reasoning and recommendations for resilient cyber systems. United States Patent 2018\/0103052, 1 December 2020"},{"key":"31_CR29","unstructured":"Verma, M., et al.: Systems and methods for identifying and mitigating outlier network activity. European Patent Office Patent EP 3 477 906 A1, 31 March 2021"},{"key":"31_CR30","unstructured":"Brdiczka, O., Mahadevan, P., Shi, R.: Method and system for thwarting insider attacks through informational network analysis. United States Patent 9,336,388, 10 May 2016"},{"key":"31_CR31","unstructured":"Shaashua, T.M., Shaashua, O.: Situation forecast mechanisms for internet of things integration platform. United States Patent 10,990,894, 27 April 2021"},{"key":"31_CR32","unstructured":"ATT&CK | cobalt strike. https:\/\/attack.mitre.org\/software\/S0154\/. Accessed 3 Mar 2022"},{"key":"31_CR33","unstructured":"CALDERA. https:\/\/caldera.mitre.org. Accessed 3 Mar 2022"},{"key":"31_CR34","doi-asserted-by":"crossref","unstructured":"Noel, S., Harley, E., Tam, K.H., Limiero, M., Share, M.: CyGraph: graph-based analytics and visualization for cybersecurity. In: Cognitive Computing: Theory and Application, Handbook of Statistics, vol. 35, pp. 117\u2013167. Elsevier, Amsterdam (2016)","DOI":"10.1016\/bs.host.2016.07.001"},{"key":"31_CR35","doi-asserted-by":"crossref","unstructured":"Noel, S., et al.: Graph analytics and visualization for cyber situational understanding. J. Defense Model. Simul. Impact Anal. Cyber Defense Optim. 1\u201315 (2021)","DOI":"10.1177\/15485129211051385"},{"key":"31_CR36","unstructured":"Noel, S., Harley, E., Tam, K.H., Limiero, M., Share, M.: System and method for visualizing and analyzing cyber-attacks using a graph model. United States Patent 10,313,382, 4 June 2019"},{"issue":"7","key":"31_CR37","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"D Liben-Nowell","year":"2007","unstructured":"Liben-Nowell, D., Kleinberg, J.: The link prediction problem for social networks. J. Am. Soc. Inform. Sci. Technol. 58(7), 1019\u20131031 (2007)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"31_CR38","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1140\/epjb\/e2009-00335-8","volume":"71","author":"T Zhou","year":"2009","unstructured":"Zhou, T., L\u00fc, L., Zhang, Y.: Predicting missing links via local information. Eur. Phys. J. B 71, 623\u2013630 (2009)","journal-title":"Eur. Phys. J. B"},{"issue":"334","key":"31_CR39","first-page":"1","volume":"10","author":"I Ahmad","year":"2020","unstructured":"Ahmad, I., Akhtar, M.U., Noor, S., Shahnaz, A.: Missing link prediction using common neighbor and centrality based parameterized algorithm. Sci. Rep. 10(334), 1\u20139 (2020)","journal-title":"Sci. Rep."},{"issue":"11","key":"31_CR40","doi-asserted-by":"publisher","first-page":"205","DOI":"10.21105\/joss.00205","volume":"2","author":"L McInnes","year":"2017","unstructured":"McInnes, L., Healy, J., Astels, S.: HDBSCAN: hierarchical density based clustering. J. Open Source Softw. 2(11), 205\u2013206 (2017)","journal-title":"J. Open Source Softw."},{"key":"31_CR41","doi-asserted-by":"crossref","unstructured":"Murtagh, F., Contreras, P.: Methods of hierarchical clustering. arXiv:1105.0121v1 (2011)","DOI":"10.1007\/978-3-642-04898-2_288"},{"key":"31_CR42","first-page":"21","volume":"1115\u20131118","author":"DJ Rogers","year":"1960","unstructured":"Rogers, D.J., Tanimoto, T.T.: A computer program for classifying plants. Science 1115\u20131118, 21 (1960)","journal-title":"Science"},{"issue":"3","key":"31_CR43","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/s10115-014-0789-0","volume":"45","author":"Y Yang","year":"2014","unstructured":"Yang, Y., Lichtenwalter, R.N., Chawla, N.V.: Evaluating link prediction methods. Knowl. Inf. Syst. 45(3), 751\u2013782 (2014). https:\/\/doi.org\/10.1007\/s10115-014-0789-0","journal-title":"Knowl. Inf. Syst."},{"key":"31_CR44","first-page":"536","volume":"7","author":"S Butterworth","year":"1930","unstructured":"Butterworth, S.: On the theory of filter amplifiers. Exper. Wirel. Wirel. Eng. 7, 536\u2013541 (1930)","journal-title":"Exper. Wirel. Wirel. Eng."},{"key":"31_CR45","doi-asserted-by":"crossref","unstructured":"Turcotte, M.J.M., Kent, A.D., Hash, C.: Unified host and network data set. In: Data Science for Cyber-Security, pp. 1\u201322. World Scientific, Singapore (2018)","DOI":"10.1142\/9781786345646_001"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T10:30:10Z","timestamp":1727865010000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}