{"id":"https://openalex.org/W3211310817","doi":"https://doi.org/10.1109/icccnt51525.2021.9579508","title":"Botnet Detection using Machine Learning","display_name":"Botnet Detection using Machine Learning","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3211310817","doi":"https://doi.org/10.1109/icccnt51525.2021.9579508","mag":"3211310817"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9579508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085834239","display_name":"K B Aswathi","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K B Aswathi","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067133420","display_name":"S Jayadev","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S Jayadev","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103944158","display_name":"Nandana Krishna","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nandana Krishna","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057875132","display_name":"Remya Krishnan","orcid":"https://orcid.org/0009-0004-0107-0753"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Remya Krishnan","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059879949","display_name":"Greeshma Sarath","orcid":"https://orcid.org/0000-0002-1703-0826"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Greeshma Sarath","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Amritapuri,India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085834239"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":2.0803,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.87681121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9826235771179199},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7516643404960632},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7475067377090454},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6638302803039551},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6006407141685486},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.5847904086112976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5628432631492615},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5130270719528198},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49175718426704407},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.421960711479187},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.41463494300842285},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.40730878710746765},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29470258951187134},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1291782259941101}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9826235771179199},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7516643404960632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7475067377090454},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6638302803039551},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6006407141685486},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.5847904086112976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5628432631492615},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5130270719528198},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49175718426704407},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.421960711479187},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.41463494300842285},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.40730878710746765},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29470258951187134},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1291782259941101},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9579508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1523098686","https://openalex.org/W2030392694","https://openalex.org/W2122494330","https://openalex.org/W2185572228","https://openalex.org/W2252366552","https://openalex.org/W2284499563","https://openalex.org/W2543487408","https://openalex.org/W2613920221","https://openalex.org/W2803167497","https://openalex.org/W2901120873","https://openalex.org/W2942124531","https://openalex.org/W2955593825","https://openalex.org/W2966943003","https://openalex.org/W2991210281","https://openalex.org/W3005260862"],"related_works":["https://openalex.org/W2771198651","https://openalex.org/W3004371238","https://openalex.org/W2934080905","https://openalex.org/W2808451423","https://openalex.org/W2054298352","https://openalex.org/W1591351727","https://openalex.org/W2546296060","https://openalex.org/W2903064080","https://openalex.org/W3076212043","https://openalex.org/W2313847479"],"abstract_inverted_index":{"A":[0,34],"bot":[1,29,41],"is":[2,36,79,90,135],"a":[3,10,19,37,44,51,118,136],"computer":[4],"that":[5],"has":[6,125],"been":[7,126],"affected":[8],"through":[9],"malware":[11],"infection":[12],"and":[13,69,124,150,170],"can":[14],"be":[15,24,109],"controlled":[16,42,59],"distantly":[17],"by":[18,43,60,83,92],"cyber-criminal.":[20],"The":[21],"cyber-criminal":[22,45],"would":[23],"able":[25],"to":[26,30,96],"utilize":[27],"the":[28,54,73,88,97,100,105,140],"dispatch":[31],"more":[32],"assaults.":[33],"botnet":[35,52,122],"collection":[38],"of":[39,48,87,139,142],"such":[40],"Infected":[46],"group":[47],"computers":[49],"creates":[50],"on":[53],"global":[55],"network.":[56,98],"Bots":[57],"are":[58,72,102],"bot-master":[61],"via":[62],"Control":[63],"&":[64],"Command":[65],"servers.":[66],"Data":[67],"breach":[68],"internet":[70],"security":[71],"main":[74],"concern":[75],"nowadays":[76],"as":[77,111,113],"it":[78],"becoming":[80],"dangerous":[81],"day":[82],"day.":[84],"Inappropriate":[85],"control":[86],"network":[89,145],"possible":[91],"sending":[93],"malicious":[94],"botnets":[95,101,143],"Once":[99],"detected":[103],"in":[104,121,130],"network,":[106],"they":[107],"should":[108],"eliminated":[110],"soon":[112],"possible.":[114],"Machine":[115,158],"Learning":[116],"plays":[117],"vital":[119],"role":[120],"detection":[123,141],"used":[127],"for":[128],"researches":[129],"this":[131],"field.":[132],"This":[133],"paper":[134],"comparative":[137],"study":[138],"from":[144],"flow":[146],"data":[147],"using":[148],"supervised":[149],"unsupervised":[151],"machine":[152],"learning":[153],"algorithms,":[154],"including":[155],"Support":[156],"Vector":[157],"(SVM),":[159],"Random":[160],"Forest,":[161],"K-Nearest":[162],"Neighbors":[163],"(KNN),":[164],"K-Means,":[165],"Principal":[166],"Component":[167],"Analysis":[168],"(PCA),":[169],"Recurrent":[171],"Neural":[172],"Networks":[173],"(RNN).":[174]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
