{"id":"https://openalex.org/W1586406983","doi":"https://doi.org/10.1109/ccnc.2015.7157987","title":"Macroscopic view of malware in home networks","display_name":"Macroscopic view of malware in home networks","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W1586406983","doi":"https://doi.org/10.1109/ccnc.2015.7157987","mag":"1586406983"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc.2015.7157987","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2015.7157987","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://porto.polito.it/2625357/1/CCNC15_malware.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002388358","display_name":"Alessandro Finamore","orcid":"https://orcid.org/0000-0003-2226-2506"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Alessandro Finamore","raw_affiliation_strings":["Politecnico di Torino","Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065769574","display_name":"Sabyasachi Saha","orcid":"https://orcid.org/0009-0008-1050-5981"},"institutions":[{"id":"https://openalex.org/I4387153345","display_name":"JTEC Corporation (Japan)","ror":"https://ror.org/050yv1382","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153345"]},{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sabyasachi Saha","raw_affiliation_strings":["Narus, Inc","Symantec Corporation"],"affiliations":[{"raw_affiliation_string":"Narus, Inc","institution_ids":[]},{"raw_affiliation_string":"Symantec Corporation","institution_ids":["https://openalex.org/I1308906816","https://openalex.org/I4387153345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012600119","display_name":"Gaspar Modelo-Howard","orcid":null},"institutions":[{"id":"https://openalex.org/I4387153345","display_name":"JTEC Corporation (Japan)","ror":"https://ror.org/050yv1382","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153345"]},{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gaspar Modelo-Howard","raw_affiliation_strings":["Narus, Inc","Symantec Corporation"],"affiliations":[{"raw_affiliation_string":"Narus, Inc","institution_ids":[]},{"raw_affiliation_string":"Symantec Corporation","institution_ids":["https://openalex.org/I1308906816","https://openalex.org/I4387153345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080290764","display_name":"Sung-Ju Lee","orcid":"https://orcid.org/0000-0003-0266-2959"},"institutions":[{"id":"https://openalex.org/I4387153345","display_name":"JTEC Corporation (Japan)","ror":"https://ror.org/050yv1382","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153345"]},{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sung-Ju Lee","raw_affiliation_strings":["Narus, Inc","Symantec Corporation"],"affiliations":[{"raw_affiliation_string":"Narus, Inc","institution_ids":[]},{"raw_affiliation_string":"Symantec Corporation","institution_ids":["https://openalex.org/I1308906816","https://openalex.org/I4387153345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028032411","display_name":"Enrico Bocchi","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]},{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["FR","IT"],"is_corresponding":false,"raw_author_name":"Enrico Bocchi","raw_affiliation_strings":["Politecnico di Torino","Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)","LINCS - Laboratory of Information, Network and Communication Sciences (23 avenue d'Italie 75013 Paris - France)","INFRES - D\u00e9partement Informatique et R\u00e9seaux (46, rue Barrault \r\n75013 Paris - France)","RMS - R\u00e9seaux, Mobilit\u00e9 et Services (T\u00e9l\u00e9com Paris 19 Place Marguerite Perey 91120 Palaiseau - France)"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"LINCS - Laboratory of Information, Network and Communication Sciences (23 avenue d'Italie 75013 Paris - France)","institution_ids":[]},{"raw_affiliation_string":"INFRES - D\u00e9partement Informatique et R\u00e9seaux (46, rue Barrault \r\n75013 Paris - France)","institution_ids":[]},{"raw_affiliation_string":"RMS - R\u00e9seaux, Mobilit\u00e9 et Services (T\u00e9l\u00e9com Paris 19 Place Marguerite Perey 91120 Palaiseau - France)","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052118192","display_name":"Luigi Grimaudo","orcid":null},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luigi Grimaudo","raw_affiliation_strings":["Politecnico di Torino","Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060087704","display_name":"Marco Mellia","orcid":"https://orcid.org/0000-0003-1859-6693"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Mellia","raw_affiliation_strings":["Politecnico di Torino","Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001695309","display_name":"Elena Baralis","orcid":"https://orcid.org/0000-0001-9231-467X"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Elena Baralis","raw_affiliation_strings":["Politecnico di Torino","Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Polito - Politecnico di Torino = Polytechnic of Turin (Politecnico di Torino - Corso Duca degli Abruzzi, 24 10129 Torino - Italy)","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5002388358"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":1.6441,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.87535425,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"262","last_page":"266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9283508062362671},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7117526531219482},{"id":"https://openalex.org/keywords/ingenuity","display_name":"Ingenuity","score":0.7028781175613403},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.6619540452957153},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6614875793457031},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6492652893066406},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5283423662185669},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4995746612548828},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.42211514711380005},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4180907607078552},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.233200341463089},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20844295620918274}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9283508062362671},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7117526531219482},{"id":"https://openalex.org/C2778154381","wikidata":"https://www.wikidata.org/wiki/Q105296908","display_name":"Ingenuity","level":2,"score":0.7028781175613403},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.6619540452957153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6614875793457031},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6492652893066406},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5283423662185669},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4995746612548828},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.42211514711380005},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4180907607078552},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.233200341463089},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20844295620918274},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C133425853","wikidata":"https://www.wikidata.org/wiki/Q60571","display_name":"Neoclassical economics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ccnc.2015.7157987","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2015.7157987","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-01351253v1","is_oa":false,"landing_page_url":"https://imt.hal.science/hal-01351253","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"12th Annual IEEE Consumer Communications & Networking Conference (IEEE CCNC'15), Jan 2015, Las Vegas, United States. pp.262 - 266, &#x27E8;10.1109/CCNC.2015.7157987&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:porto.polito.it:2625357","is_oa":true,"landing_page_url":"http://porto.polito.it/2625357/1/CCNC15_malware.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306402038","display_name":"PORTO Publications Open Repository TOrino (Politecnico di Torino)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177477856","host_organization_name":"Politecnico di Torino","host_organization_lineage":["https://openalex.org/I177477856"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:porto.polito.it:2625357","is_oa":true,"landing_page_url":"http://porto.polito.it/2625357/1/CCNC15_malware.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306402038","display_name":"PORTO Publications Open Repository TOrino (Politecnico di Torino)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177477856","host_organization_name":"Politecnico di Torino","host_organization_lineage":["https://openalex.org/I177477856"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W40177048","https://openalex.org/W1542248099","https://openalex.org/W1970867218","https://openalex.org/W1989401787","https://openalex.org/W2001377641","https://openalex.org/W2040424958","https://openalex.org/W2082180526","https://openalex.org/W2095450067","https://openalex.org/W2095610745","https://openalex.org/W2126169116","https://openalex.org/W2245533262","https://openalex.org/W6601628813","https://openalex.org/W6632653372","https://openalex.org/W6674628898"],"related_works":["https://openalex.org/W4249009605","https://openalex.org/W2900526031","https://openalex.org/W4256304280","https://openalex.org/W2395100307","https://openalex.org/W2909615516","https://openalex.org/W3183826413","https://openalex.org/W4243179955","https://openalex.org/W3205001643","https://openalex.org/W2557742076","https://openalex.org/W2968504645"],"abstract_inverted_index":{"Malicious":[0],"activities":[1,50,148],"on":[2],"the":[3,10,17,21,72,86,93,102,115],"Web":[4],"are":[5,14],"increasingly":[6],"threatening":[7],"users":[8],"in":[9],"Internet.":[11],"Home":[12],"networks":[13],"one":[15],"of":[16,20,37,65,75,88,95,146],"prime":[18],"targets":[19],"attackers":[22],"to":[23,32,40,47,57,70,109,125],"host":[24],"malware,":[25],"commonly":[26],"exploited":[27],"as":[28,79],"a":[29,35],"stepping":[30],"stone":[31],"further":[33],"launch":[34],"variety":[36],"attacks.":[38],"Due":[39],"diversification,":[41],"existing":[42],"security":[43,59],"solutions":[44],"often":[45],"fail":[46],"detect":[48],"malicious":[49,98,147],"that":[51,131,149],"remain":[52],"hidden":[53],"and":[54,60],"pose":[55,101],"threats":[56],"users'":[58],"privacy.":[61],"Characterizing":[62],"behavioral":[63,112],"patterns":[64,113],"known":[66,89,118],"malware":[67,81,90],"can":[68],"help":[69,92],"improve":[71],"classification":[73],"accuracy":[74],"threats.":[76],"More":[77],"importantly,":[78],"different":[80],"might":[82],"share":[83],"commonalities,":[84],"studying":[85],"behavior":[87],"could":[91],"detection":[94],"previously":[96],"unknown":[97],"activities.":[99],"We":[100,121,141],"research":[103],"question":[104],"if":[105],"it":[106],"is":[107],"possible":[108],"characterize":[110],"such":[111,127],"analyzing":[114],"traffic":[116],"from":[117],"infected":[119],"clients.":[120],"present":[122,143],"our":[123,144],"quest":[124],"discover":[126],"characterizations.":[128],"Results":[129],"show":[130],"commonalities":[132],"arise":[133],"but":[134],"their":[135],"identification":[136],"may":[137],"require":[138],"some":[139],"ingenuity.":[140],"also":[142],"discovery":[145],"were":[150],"left":[151],"undetected":[152],"by":[153],"commercial":[154],"IDS.":[155]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
