{"id":"https://openalex.org/W3047801554","doi":"https://doi.org/10.1109/cns48642.2020.9162202","title":"DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware","display_name":"DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3047801554","doi":"https://doi.org/10.1109/cns48642.2020.9162202","mag":"3047801554"},"language":"en","primary_location":{"id":"doi:10.1109/cns48642.2020.9162202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070866953","display_name":"Md Sajidul Islam Sajid","orcid":"https://orcid.org/0000-0001-7269-3748"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Sajidul Islam Sajid","raw_affiliation_strings":["Software and Information Systems, University of North Carolina at Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"Software and Information Systems, University of North Carolina at Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051564807","display_name":"Jinpeng Wei","orcid":"https://orcid.org/0000-0002-6982-7386"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinpeng Wei","raw_affiliation_strings":["Software and Information Systems, University of North Carolina at Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"Software and Information Systems, University of North Carolina at Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100552032","display_name":"Md Rabbi Alam","orcid":"https://orcid.org/0009-0009-8463-3449"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Rabbi Alam","raw_affiliation_strings":["Software and Information Systems, University of North Carolina at Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"Software and Information Systems, University of North Carolina at Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018155820","display_name":"Ehsan Aghaei","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ehsan Aghaei","raw_affiliation_strings":["Software and Information Systems, University of North Carolina at Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"Software and Information Systems, University of North Carolina at Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043893479","display_name":"Ehab Al\u2010Shaer","orcid":"https://orcid.org/0000-0002-7665-8293"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ehab Al-Shaer","raw_affiliation_strings":["Software and Information Systems, University of North Carolina at Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"Software and Information Systems, University of North Carolina at Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5070866953"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":1.3638,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.81375905,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.946556568145752},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8947628736495972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7885518074035645},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.702255368232727},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.572415828704834},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5358157753944397},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.48417407274246216},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.47630155086517334},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3988463282585144}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.946556568145752},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8947628736495972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7885518074035645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.702255368232727},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.572415828704834},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5358157753944397},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.48417407274246216},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.47630155086517334},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3988463282585144},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns48642.2020.9162202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W58217822","https://openalex.org/W105015318","https://openalex.org/W174107706","https://openalex.org/W191656338","https://openalex.org/W1480909796","https://openalex.org/W1510508184","https://openalex.org/W1573594453","https://openalex.org/W1666397912","https://openalex.org/W2003791967","https://openalex.org/W2072610876","https://openalex.org/W2101077503","https://openalex.org/W2117030266","https://openalex.org/W2120297918","https://openalex.org/W2131744502","https://openalex.org/W2137530017","https://openalex.org/W2146350924","https://openalex.org/W2151915331","https://openalex.org/W2153579005","https://openalex.org/W2169602770","https://openalex.org/W2214740502","https://openalex.org/W2215557951","https://openalex.org/W2295441334","https://openalex.org/W2402560368","https://openalex.org/W2537238206","https://openalex.org/W2539082945","https://openalex.org/W2572772209","https://openalex.org/W2581532517","https://openalex.org/W2588425636","https://openalex.org/W2903029239","https://openalex.org/W2949012968","https://openalex.org/W3105162108","https://openalex.org/W4251775324","https://openalex.org/W4294170691","https://openalex.org/W6630637722","https://openalex.org/W6677743974","https://openalex.org/W6679775712","https://openalex.org/W6682691769"],"related_works":["https://openalex.org/W2350724208","https://openalex.org/W2000018903","https://openalex.org/W3142690625","https://openalex.org/W1534090575","https://openalex.org/W2360866534","https://openalex.org/W2372392697","https://openalex.org/W4312961703","https://openalex.org/W2362932354","https://openalex.org/W2391396896","https://openalex.org/W2998623387"],"abstract_inverted_index":{"With":[0],"the":[1,44,58,68,71,86,94,103,117,174,211],"advancement":[2],"of":[3,105,198,213,234],"technology,":[4],"all":[5],"our":[6,25,74,160,187],"valuable":[7],"and":[8,76,113,137,155,176,190,230],"sensitive":[9],"information":[10,26,172],"has":[11,34],"now":[12],"moved":[13],"into":[14],"digital":[15],"formats.":[16],"Adversary":[17],"utilizes":[18],"malware":[19,69,79,107,134,199,207,214,229],"as":[20],"a":[21,39,195],"medium":[22,72],"to":[23,37,57,83,88,92,115,151,169,173,192,209,240,246],"steal":[24],"for":[27],"their":[28,65,157,178],"benefits.":[29],"Active":[30],"Cyber":[31],"Deception":[32],"(ACD)":[33],"emerged":[35],"prominently":[36],"defend":[38],"computer":[40],"system":[41],"by":[42,53,142,149,164],"making":[43,60,180],"attackers":[45,150],"think":[46],"it":[47],"is":[48,70,81],"not":[49],"worth":[50],"attacking":[51],"or":[52],"presenting":[54],"falsified":[55,90],"data":[56,91],"attackers,":[59],"them":[61],"believe":[62],"they":[63],"achieved":[64],"purpose.":[66],"As":[67],"between":[73],"systems":[75,154],"adversaries,":[77],"comprehensive":[78,106,133,223],"analysis":[80,108,136,243],"required":[82],"find":[84],"out":[85],"ways":[87],"present":[89,124],"mislead":[93],"attackers.":[95],"Nevertheless,":[96],"developing":[97],"an":[98,126,218],"active":[99],"cyber":[100,128],"deception":[101,129,139,144,167],"with":[102,194,227,238],"guidance":[104],"requires":[109],"human":[110,183],"intelligence,":[111],"effort":[112],"insight":[114],"characterize":[116],"attack":[118],"behaviors.":[119],"In":[120],"this":[121],"paper,":[122],"we":[123,204],"DodgeTron,":[125],"autonomous":[127],"approach,":[130],"which":[131],"performs":[132],"behavioral":[135],"creates":[138],"schemes":[140],"automatically":[141,181],"extracting":[143],"parameters":[145,168],"that":[146,216],"are":[147],"leveraged":[148],"discover":[152],"target":[153],"reach":[156],"goal.":[158],"Thus":[159],"approach":[161,188],"protects":[162],"users'":[163],"altering":[165],"these":[166],"feed":[170],"false":[171],"adversaries":[175],"corrupt":[177],"decisions":[179],"without":[182],"effort.":[184],"To":[185],"make":[186],"efficient":[189],"scalable":[191],"deal":[193],"large":[196],"number":[197,212],"samples":[200,215],"created":[201],"per":[202],"day,":[203],"employ":[205],"machine-learning-based":[206],"classification":[208],"reduce":[210],"require":[217],"in-depth":[219],"analysis.":[220],"We":[221],"conducted":[222],"evaluations":[224],"on":[225,236],"DodgeTron":[226],"recent":[228],"confirmed":[231],"its":[232],"accuracy":[233],"91.18%":[235],"average":[237],"l.lx":[239],"2.":[241],"8x":[242],"time":[244],"optimization":[245],"achieve":[247],"deception.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
