{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:18Z","timestamp":1750309398038,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3672202.3673732","type":"proceedings-article","created":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T18:27:48Z","timestamp":1722882468000},"page":"107-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Demo: Synthesizing Realistic Enterprise Active Directory Attack Graphs with ADSynth"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7773-8500","authenticated-orcid":false,"given":"Nhu Long","family":"Nguyen","sequence":"first","affiliation":[{"name":"The University of Adelaide, Adelaide, South Australia, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7892-6813","authenticated-orcid":false,"given":"Nickolas","family":"Falkner","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, South Australia, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1028-920X","authenticated-orcid":false,"given":"Hung","family":"Nguyen","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, South Australia, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,8,5]]},"reference":[{"unstructured":"Microsoft MVP Alan Bruchill. 2010. Active Directory Structure Guidelines - Part 1. (2010).","key":"e_1_3_2_1_1_1"},{"unstructured":"Will Schroeder Andy Robbins Rohan Vazarkar. 2022. BloodHound: Six Degrees of Domain Admin. https:\/\/bloodhound.readthedocs.io\/en\/latest\/index.html. (2022). Accessed: 2022-12-14.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/NCG.2018.8593188"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Blog Paramount Defeneses","year":"2021","unstructured":"Paramount Defeneses Blog. 2021. At the HEART of the Colonial Pipeline Hack - Admin Access in Active Directory. (July 2021). Retrieved May 23, 2024 from https:\/\/blog.paramountdefenses.com\/2021\/07\/at-heart-of-colonial-pipeline-hack.html"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Carolo Nicolas","year":"2022","unstructured":"Nicolas Carolo. 2022. adsimulator: a realistic simulator of Active Directory domains. (June 2022). Retrieved March 31, 2023 from https:\/\/github.com\/nicolas-carolo\/adsimulator"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/3-540-09237-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1609\/aaai.v36i9.21167"},{"key":"e_1_3_2_1_8_1","volume-title":"SolarWinds hack was' largest and most sophisticated attack'ever: Microsoft president. Retrieved June 28","author":"Heath Brad","year":"2021","unstructured":"Brad Heath, Heather Timmons, and Peter Cooney. 2021. SolarWinds hack was' largest and most sophisticated attack'ever: Microsoft president. Retrieved June 28 (2021), 2021."},{"volume-title":"Retrieved","year":"2023","unstructured":"Microsoft. 2023. AD DS Design and Planning. (May 2023). Retrieved Nov 15, 2023 from https:\/\/learn.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/plan\/ad-ds-design-and-planning","key":"e_1_3_2_1_9_1"},{"unstructured":"Microsoft. 2023. Tier model for partitioning administrative privileges. (2023). https:\/\/learn.microsoft.com\/en-us\/microsoft-identity-manager\/pam\/tier-model-for-partitioning-administrative-privileges","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Mindel Tammy","year":"2022","unstructured":"Tammy Mindel. 2022. Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them. (August 2022). Retrieved May 23, 2024 from https:\/\/www.cyberdefensemagazine.com\/top-legacy-active-directory\/"},{"unstructured":"Andi Morris. 2022. GoodHound. https:\/\/github.com\/idnahacks\/GoodHound. (2022). Accessed: 2022-12-14.","key":"e_1_3_2_1_12_1"},{"unstructured":"Neo4j Inc. 2023. Neo4J graph database. https:\/\/neo4j.com\/product\/neo4j-graph-database\/. (2023). Version 5.13.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs. arXiv preprint arXiv:2312.16820","author":"Ngo Huy Quang","year":"2023","unstructured":"Huy Quang Ngo, Mingyu Guo, and Hung Nguyen. 2023. Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs. arXiv preprint arXiv:2312.16820 (2023)."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, RC","author":"Ngo Huy Q","year":"2023","unstructured":"Huy Q Ngo, Mingyu Guo, and Hung Nguyen. 2023. Near Optimal Strategies for Honeypots Placement in Dynamic and Large Active Directory Networks. In Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, RC, South Carolina, USA, 2517--2519."},{"key":"e_1_3_2_1_16_1","volume-title":"ADSynth: Synthesizing Realistic Active Directory Attack Graphs. In 2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE","author":"Nguyen Nhu Long","year":"2024","unstructured":"Nhu Long Nguyen, Nickolas Falkner, and Hung Nguyen. 2024. ADSynth: Synthesizing Realistic Active Directory Attack Graphs. In 2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, Piscataway, NJ, USA."},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Robert Jerome","year":"2024","unstructured":"Jerome Robert. n.a.. A GLOBAL THREAT TO ENTERPRISES: THE IMPACT OF ACTIVE DIRECTORY ATTACKS. (n.a.). Retrieved May 23, 2024 from https:\/\/content.shi.com\/SHIcom\/ContentAttachmentImages\/SharedResources\/PDFs\/Tenable\/Tenable.ad-052121-%20Ebook.pdf"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Robichaux Paul","year":"2023","unstructured":"Paul Robichaux. 2023. AD-Based Attacks in 2023 - What We've Learned So Far. (August 2023). Retrieved May 23, 2024 from https:\/\/practical365.com\/ad-based-attacks-in-2023-what-weve-learned-so-far\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","author":"Vazarkar Rohan Andy","year":"2020","unstructured":"Andy Robbins W.S and Vazarkar Rohan. 2020. BloodHound Database Creator. (april 2020). Retrieved March 31, 2023 from https:\/\/github.com\/BloodHoundAD\/BloodHound-Tools\/tree\/master\/DBCreator"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/3579856.3590343"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"ACM SIGCOMM Posters and Demos '24","name":"ACM SIGCOMM Posters and Demos '24: ACM SIGCOMM 2024 Conference: Posters and Demos","location":"Sydney NSW Australia"},"container-title":["Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672202.3673732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672202.3673732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:48Z","timestamp":1750294668000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672202.3673732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":20,"alternative-id":["10.1145\/3672202.3673732","10.1145\/3672202"],"URL":"https:\/\/doi.org\/10.1145\/3672202.3673732","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}