{"id":"https://openalex.org/W4290996912","doi":"https://doi.org/10.1109/icc45855.2022.9838409","title":"Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples","display_name":"Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4290996912","doi":"https://doi.org/10.1109/icc45855.2022.9838409"},"language":"en","primary_location":{"id":"doi:10.1109/icc45855.2022.9838409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9838409","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"funder","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189","Ministry of Education, Key Laboratory of Computer Network and Information Integration (Southeast University), China","Research Base of International Cyberspace Governance (Southeast University), Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Ministry of Education, Key Laboratory of Computer Network and Information Integration (Southeast University), China","institution_ids":["https://openalex.org/I1327237609","https://openalex.org/I76569877"]},{"raw_affiliation_string":"Research Base of International Cyberspace Governance (Southeast University), Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100339715","display_name":"Miao Li","orcid":"https://orcid.org/0000-0002-9623-9379"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Miao Li","raw_affiliation_strings":["Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"funder","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","Research Base of International Cyberspace Governance (Southeast University), Nanjing, China","Ministry of Education, Key Laboratory of Computer Network and Information Integration (Southeast University), China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"Research Base of International Cyberspace Governance (Southeast University), Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Ministry of Education, Key Laboratory of Computer Network and Information Integration (Southeast University), China","institution_ids":["https://openalex.org/I1327237609","https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665328","display_name":"Ruidong Li","orcid":"https://orcid.org/0000-0002-9905-8952"},"institutions":[{"id":"https://openalex.org/I10091056","display_name":"Kanazawa University","ror":"https://ror.org/02hwp6a56","country_code":"JP","type":"education","lineage":["https://openalex.org/I10091056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ruidong Li","raw_affiliation_strings":["Kanazawa University,Institute of Science and Engineering,Kakuma, Kanazawa,Japan,920-1192"],"affiliations":[{"raw_affiliation_string":"Kanazawa University,Institute of Science and Engineering,Kakuma, Kanazawa,Japan,920-1192","institution_ids":["https://openalex.org/I10091056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Wu","raw_affiliation_strings":["Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034787225","display_name":"Jian Gong","orcid":"https://orcid.org/0000-0001-7264-3636"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Gong","raw_affiliation_strings":["Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science &#x0026; Engineering,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5073150709"],"corresponding_institution_ids":["https://openalex.org/I1327237609","https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08648498,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2670","last_page":"2675"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.8015267848968506},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7125899195671082},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7105337381362915},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6761969923973083},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5727680325508118},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5657289624214172},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.556388258934021},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.53038090467453},{"id":"https://openalex.org/keywords/extractor","display_name":"Extractor","score":0.5009863376617432},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4864599406719208},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4559503197669983},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.41918396949768066},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.412274569272995},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3747144937515259},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16050797700881958},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10776820778846741},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.06843620538711548}],"concepts":[{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.8015267848968506},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7125899195671082},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7105337381362915},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6761969923973083},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5727680325508118},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5657289624214172},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.556388258934021},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.53038090467453},{"id":"https://openalex.org/C117978034","wikidata":"https://www.wikidata.org/wiki/Q5422192","display_name":"Extractor","level":2,"score":0.5009863376617432},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4864599406719208},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4559503197669983},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.41918396949768066},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.412274569272995},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3747144937515259},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16050797700881958},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10776820778846741},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.06843620538711548},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C21880701","wikidata":"https://www.wikidata.org/wiki/Q2144042","display_name":"Process engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45855.2022.9838409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9838409","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324856","display_name":"Southeast University","ror":"https://ror.org/04ct4d772"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W17316494","https://openalex.org/W22566950","https://openalex.org/W1561983441","https://openalex.org/W1940872118","https://openalex.org/W2138621090","https://openalex.org/W2170240176","https://openalex.org/W2171590421","https://openalex.org/W2464432954","https://openalex.org/W2546910111","https://openalex.org/W2768793959","https://openalex.org/W2786906486","https://openalex.org/W2889547652","https://openalex.org/W2904411527","https://openalex.org/W3001230617","https://openalex.org/W3035571898","https://openalex.org/W3036666454","https://openalex.org/W3036942035","https://openalex.org/W3089392154","https://openalex.org/W3094843939","https://openalex.org/W3096655658","https://openalex.org/W3103331180","https://openalex.org/W3104899859","https://openalex.org/W3171007011","https://openalex.org/W6633578641","https://openalex.org/W6640362995","https://openalex.org/W6685053522","https://openalex.org/W6719105664","https://openalex.org/W6729497825"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964"],"abstract_inverted_index":{"Domain":[0],"Generation":[1],"Algorithms":[2],"(DGAs)":[3],"are":[4,58,166],"widely":[5],"applied":[6],"in":[7,48,152,202],"diversified":[8],"malicious":[9],"attack":[10,50],"patterns":[11],"such":[12,76],"as":[13,77,126],"botnets.":[14],"Attacks":[15],"utilize":[16],"DGAs":[17,109],"to":[18,23,125,139,178],"dynamically":[19],"create":[20],"pseudorandom":[21],"domains":[22],"evade":[24],"security":[25],"detection":[26,38,121,221,230],"and":[27,33,81,91,96,133,197,223],"successfully":[28],"connect":[29],"bots":[30],"with":[31,72,114],"Command":[32],"Controls":[34],"(C&C)":[35],"servers.":[36],"The":[37],"of":[39,53,175],"Algorithmically":[40],"Generated":[41],"Domains":[42],"(AGDs)":[43],"plays":[44],"an":[45],"essential":[46],"role":[47],"network":[49,113,137],"detection.":[51],"Most":[52],"the":[54,100,135,141,146,153,170],"existing":[55],"DGA":[56,67,79,83,120,164,200,205,209],"detectors":[57,68,88,201],"machine":[59,86,162,219],"learning":[60,132],"or":[61,207],"deep":[62,228],"learning-based":[63,87,163,220,229],"methods.":[64],"However,":[65],"these":[66],"perform":[69],"relatively":[70],"poorly":[71],"insufficient":[73,115],"training":[74,116,159,234],"samples,":[75],"small-scale":[78,204],"families":[80,206],"emerging":[82,208],"variants.":[84,210],"Besides,":[85],"require":[89],"sophisticated":[90],"time-consuming":[92],"artificial":[93],"feature":[94,142,173,192],"extraction,":[95],"attackers":[97],"can":[98,187],"circumvent":[99],"extracted":[101,171],"features.":[102],"This":[103],"paper":[104],"focuses":[105],"on":[106,111,169],"accurately":[107],"detecting":[108],"based":[110,168],"siamese":[112,136],"samples.":[117,160,235],"Our":[118,181],"proposed":[119],"method":[122],"is":[123,214],"referred":[124],"DGAD-SN.":[127],"DGAD-SN":[128,186],"first":[129],"introduces":[130],"contrastive":[131],"adopts":[134],"framework":[138],"construct":[140],"extractor,":[143],"which":[144],"excavates":[145],"implicit":[147],"relationship":[148],"information":[149],"between":[150],"characters":[151],"domain":[154,176,195],"name":[155],"strings":[156],"using":[157,232],"limited":[158,233],"Then":[161],"classifiers":[165],"trained":[167],"neural":[172,191],"vectors":[174,193],"names":[177,196],"identify":[179],"AGDs.":[180],"experimental":[182],"studies":[183],"suggest":[184],"that":[185],"efficiently":[188],"extract":[189],"distinguishable":[190],"for":[194],"outperforms":[198],"state-of-the-art":[199],"identifying":[203],"Its":[211],"average":[212],"accuracy":[213],"10%\u221215%":[215],"higher":[216,226],"than":[217,227],"conventional":[218],"methods":[222,231],"about":[224],"1%\u22122%":[225]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
