{"id":"https://openalex.org/W4390098154","doi":"https://doi.org/10.1109/commnet60167.2023.10365268","title":"Improving IoT Botnet Detection Using Ensemble Learning","display_name":"Improving IoT Botnet Detection Using Ensemble Learning","publication_year":2023,"publication_date":"2023-12-11","ids":{"openalex":"https://openalex.org/W4390098154","doi":"https://doi.org/10.1109/commnet60167.2023.10365268"},"language":"en","primary_location":{"id":"doi:10.1109/commnet60167.2023.10365268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet60167.2023.10365268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070447576","display_name":"Youssra Baja","orcid":null},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Youssra Baja","raw_affiliation_strings":["Ibn Tofail University in Kenitra,National School of Applied Sciences,Morocco","National School of Applied Sciences, Ibn Tofail University in Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University in Kenitra,National School of Applied Sciences,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"National School of Applied Sciences, Ibn Tofail University in Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075132083","display_name":"Khalid Chougdali","orcid":"https://orcid.org/0000-0002-1072-0461"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalid Chougdali","raw_affiliation_strings":["Ibn Tofail University in Kenitra,National School of Applied Sciences,Morocco","National School of Applied Sciences, Ibn Tofail University in Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University in Kenitra,National School of Applied Sciences,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"National School of Applied Sciences, Ibn Tofail University in Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025108748","display_name":"Abdellatif Kobbane","orcid":"https://orcid.org/0000-0003-3593-4084"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdellatif Kobbane","raw_affiliation_strings":["ENSIAS, Mohammed V University in Rabat,Morocco","ENSIAS, Mohammed V University in Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"ENSIAS, Mohammed V University in Rabat,Morocco","institution_ids":["https://openalex.org/I126477371"]},{"raw_affiliation_string":"ENSIAS, Mohammed V University in Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070447576"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":0.5921,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70471335,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9499412178993225},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8043790459632874},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7214815020561218},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6978472471237183},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6564031839370728},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.6379433870315552},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5598484873771667},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44752418994903564},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38888680934906006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3458123803138733},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10385191440582275},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09340962767601013}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9499412178993225},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8043790459632874},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7214815020561218},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6978472471237183},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6564031839370728},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.6379433870315552},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5598484873771667},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44752418994903564},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38888680934906006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3458123803138733},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10385191440582275},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09340962767601013},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet60167.2023.10365268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet60167.2023.10365268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2300666213","https://openalex.org/W2494155958","https://openalex.org/W2594434602","https://openalex.org/W2790513427","https://openalex.org/W2799758613","https://openalex.org/W2892556724","https://openalex.org/W2899365137","https://openalex.org/W2911869793","https://openalex.org/W2965552844","https://openalex.org/W2968184507","https://openalex.org/W2969625665","https://openalex.org/W3037015068","https://openalex.org/W3097494778","https://openalex.org/W3111288713","https://openalex.org/W3120934607","https://openalex.org/W3122864121","https://openalex.org/W3125062534","https://openalex.org/W3126727929","https://openalex.org/W3129455871","https://openalex.org/W3133886843","https://openalex.org/W3165127907","https://openalex.org/W3196738623","https://openalex.org/W4200562485","https://openalex.org/W4206409835","https://openalex.org/W4220985538","https://openalex.org/W4387870209","https://openalex.org/W4387870611","https://openalex.org/W6795971297","https://openalex.org/W6891918480"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2883616266","https://openalex.org/W186576250","https://openalex.org/W2372254325"],"abstract_inverted_index":{"With":[0],"the":[1,41,81,87,92,107],"increasing":[2],"use":[3],"of":[4,6,45,91],"Internet":[5],"Things":[7],"(IoT)":[8],"devices":[9],"in":[10,66],"various":[11,59],"domains,":[12],"including":[13],"offices,":[14],"homes,":[15],"hospitals,":[16],"cities,":[17],"and":[18,28,33,43,64,89],"transportation,":[19],"cyberattacks":[20],"using":[21,80],"malicious":[22],"attacks":[23,79],"have":[24],"become":[25],"more":[26],"frequent":[27],"complex,":[29],"posing":[30],"new":[31],"challenges":[32],"risks.":[34],"Therefore,":[35],"it":[36],"is":[37],"crucial":[38],"to":[39,76],"enhance":[40],"speed":[42],"accuracy":[44,115],"security":[46],"measures.":[47],"In":[48],"this":[49],"paper,":[50],"we":[51],"propose":[52],"an":[53],"ensemble":[54],"machine-learning":[55],"model":[56,109],"that":[57,106],"utilizes":[58],"techniques,":[60],"such":[61],"as":[62],"Stacking":[63],"Bagging,":[65],"combination":[67],"with":[68],"individual":[69],"classifiers":[70],"based":[71],"on":[72],"machine":[73],"learning":[74],"models":[75],"detect":[77],"botnet":[78],"N-BaIoT":[82],"dataset.":[83],"Our":[84],"results":[85],"demonstrate":[86],"efficiency":[88],"efficacy":[90],"proposed":[93],"stacking":[94],"model,":[95],"which":[96],"outperformed":[97],"other":[98],"techniques":[99],"for":[100],"every":[101],"evaluation":[102],"metric.":[103],"We":[104],"conclude":[105],"selected":[108],"can":[110],"achieve":[111],"a":[112],"very":[113],"good":[114],"rate.":[116]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
