{"id":"https://openalex.org/W2042940703","doi":"https://doi.org/10.1109/ewdts.2014.7027100","title":"Discovering new indicators for botnet traffic detection","display_name":"Discovering new indicators for botnet traffic detection","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W2042940703","doi":"https://doi.org/10.1109/ewdts.2014.7027100","mag":"2042940703"},"language":"en","primary_location":{"id":"doi:10.1109/ewdts.2014.7027100","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2014.7027100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of IEEE East-West Design &amp; Test Symposium (EWDTS 2014)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084305447","display_name":"Alexander Adamov","orcid":"https://orcid.org/0000-0002-0120-5388"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Alexander Adamov","raw_affiliation_strings":["Computer Engineering Faculty, Kharkov National University of Radioelectronics, Kharkov, Ukraine","Computer Engineering Faculty, Kharkov National University of Radioelectronics, Lenin Ave. 14, Ukraine, 61166"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Faculty, Kharkov National University of Radioelectronics, Kharkov, Ukraine","institution_ids":["https://openalex.org/I107158390"]},{"raw_affiliation_string":"Computer Engineering Faculty, Kharkov National University of Radioelectronics, Lenin Ave. 14, Ukraine, 61166","institution_ids":["https://openalex.org/I107158390"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044434351","display_name":"Vladimir Hahanov","orcid":"https://orcid.org/0000-0001-5312-5841"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Vladimir Hahanov","raw_affiliation_strings":["Computer Engineering Faculty, Kharkov National University of Radioelectronics, Kharkov, Ukraine","Computer Engineering Faculty, Kharkov National University of Radioelectronics, Lenin Ave. 14, Ukraine, 61166"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Faculty, Kharkov National University of Radioelectronics, Kharkov, Ukraine","institution_ids":["https://openalex.org/I107158390"]},{"raw_affiliation_string":"Computer Engineering Faculty, Kharkov National University of Radioelectronics, Lenin Ave. 14, Ukraine, 61166","institution_ids":["https://openalex.org/I107158390"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054314504","display_name":"Anders Carlsson","orcid":"https://orcid.org/0000-0002-9328-9143"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Anders Carlsson","raw_affiliation_strings":["Computer Engineering Faculty, Kharkov National University of Radioelectronics, Kharkov, Ukraine","Computer Engineering Faculty, Kharkov National University of Radioelectronics, Lenin Ave. 14, Ukraine, 61166"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Faculty, Kharkov National University of Radioelectronics, Kharkov, Ukraine","institution_ids":["https://openalex.org/I107158390"]},{"raw_affiliation_string":"Computer Engineering Faculty, Kharkov National University of Radioelectronics, Lenin Ave. 14, Ukraine, 61166","institution_ids":["https://openalex.org/I107158390"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084305447"],"corresponding_institution_ids":["https://openalex.org/I107158390"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12923026,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9711999893188477,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9488517642021179},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.636849045753479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43676161766052246},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16793343424797058},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14643052220344543}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9488517642021179},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.636849045753479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43676161766052246},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16793343424797058},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14643052220344543}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ewdts.2014.7027100","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2014.7027100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of IEEE East-West Design &amp; Test Symposium (EWDTS 2014)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2017934481"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W3159690896","https://openalex.org/W4230824443","https://openalex.org/W2945572725","https://openalex.org/W1989286518","https://openalex.org/W2921012173","https://openalex.org/W2758517546","https://openalex.org/W3134680667","https://openalex.org/W2804396347","https://openalex.org/W2185943007"],"abstract_inverted_index":{"Botnets":[0],"became":[1],"the":[2,20,91,101,126,155],"powerful":[3],"cyber":[4],"weapon":[5],"that":[6,77,97,111,162],"involves":[7],"tens":[8],"of":[9,11,37,65,100,118,125,132,150,154,169],"millions":[10],"infected":[12,170],"computers":[13],"-":[14,17],"\u201ccyber":[15],"zombies\u201d":[16],"all":[18],"over":[19],"world.":[21],"The":[22,145,159],"security":[23],"industry":[24],"makes":[25],"efforts":[26],"to":[27,140,166],"prevent":[28],"spreading":[29],"botnets":[30,43],"and":[31,56,73,137],"compromising":[32],"an":[33],"Individual":[34],"Cyberspace":[35],"(IC)[1]":[36],"users":[38],"in":[39,115,172,178],"such":[40],"way.":[41],"However,":[42],"continue":[44],"existing":[45],"despite":[46],"numerous":[47],"takedowns":[48],"initiated":[49],"by":[50,70],"antivirus":[51],"companies,":[52],"Microsoft,":[53],"FBI,":[54],"Europol":[55],"others.":[57],"In":[58],"this":[59,88,179],"paper":[60],"we":[61,89,107],"investigate":[62],"existed":[63],"methods":[64],"traffic":[66,84,136],"detection":[67,116,168],"represented":[68],"mostly":[69],"IDS":[71,119],"system":[72],"discover":[74],"new":[75,109,130],"indicators":[76,131],"can":[78,163],"be":[79,113,164],"utilized":[80],"for":[81],"improving":[82],"botnet":[83,135,157],"detection.":[85],"To":[86],"do":[87],"analyse":[90],"most":[92],"prevalent":[93],"backdoors":[94],"communication":[95,152],"protocols":[96],"stay":[98],"behind":[99],"popular":[102],"botnets.":[103],"As":[104],"a":[105,151,173],"result,":[106],"extracted":[108],"data":[110],"might":[112],"used":[114,165],"routines":[117],"(Intrusion":[120],"Detection":[121],"System).":[122],"An":[123],"objective":[124],"study":[127],"is":[128],"mining":[129],"compromise":[133],"from":[134],"using":[138],"them":[139],"identify":[141],"cyber-attacks":[142],"on":[143],"IC.":[144],"analysis":[146,149],"method":[147],"assumes":[148],"protocol":[153],"top":[156],"backdoors.":[158],"discovered":[160],"results":[161],"improve":[167],"hosts":[171],"local":[174],"network":[175],"are":[176],"presented":[177],"paper.":[180]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
