{"id":"https://openalex.org/W4220736440","doi":"https://doi.org/10.1109/imcom53663.2022.9721811","title":"Machine Learning for Multi-Classification of Botnets Attacks","display_name":"Machine Learning for Multi-Classification of Botnets Attacks","publication_year":2022,"publication_date":"2022-01-03","ids":{"openalex":"https://openalex.org/W4220736440","doi":"https://doi.org/10.1109/imcom53663.2022.9721811"},"language":"en","primary_location":{"id":"doi:10.1109/imcom53663.2022.9721811","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom53663.2022.9721811","pdf_url":null,"source":{"id":"https://openalex.org/S4363608555","display_name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103196894","display_name":"Thanh Cong Tran","orcid":"https://orcid.org/0000-0003-0864-3054"},"institutions":[{"id":"https://openalex.org/I181727666","display_name":"University of Economics Ho Chi Minh City","ror":"https://ror.org/010yce376","country_code":"VN","type":"education","lineage":["https://openalex.org/I181727666"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Thanh Cong Tran","raw_affiliation_strings":["Ho Chi Minh University of Economics and Finance (UEF),Ho Chi Minh City,Vietnam","Ho Chi Minh University of Economics and Finance (UEF), Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Ho Chi Minh University of Economics and Finance (UEF),Ho Chi Minh City,Vietnam","institution_ids":["https://openalex.org/I181727666"]},{"raw_affiliation_string":"Ho Chi Minh University of Economics and Finance (UEF), Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I181727666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029072011","display_name":"Tran Khanh Dang","orcid":"https://orcid.org/0000-0002-7282-3589"},"institutions":[{"id":"https://openalex.org/I4210116271","display_name":"Ho Chi Minh City University of Industry and Trade","ror":"https://ror.org/02b2dfs85","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210116271"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Tran Khanh Dang","raw_affiliation_strings":["Ho Chi Minh City University of Food Industry,Ho Chi Minh City,Vietnam","Ho Chi Minh City University of Food Industry, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Ho Chi Minh City University of Food Industry,Ho Chi Minh City,Vietnam","institution_ids":["https://openalex.org/I4210116271"]},{"raw_affiliation_string":"Ho Chi Minh City University of Food Industry, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I4210116271"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103196894"],"corresponding_institution_ids":["https://openalex.org/I181727666"],"apc_list":null,"apc_paid":null,"fwci":1.7299,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.83507162,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8493328094482422},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7833297252655029},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7129772901535034},{"id":"https://openalex.org/keywords/f1-score","display_name":"F1 score","score":0.623745322227478},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6085036396980286},{"id":"https://openalex.org/keywords/confusion-matrix","display_name":"Confusion matrix","score":0.5851947069168091},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5737271308898926},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5358193516731262},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.5147304534912109},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.44299885630607605},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.43404027819633484},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4100729823112488},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.3567466735839844},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.346680611371994},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.29618149995803833},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15770304203033447}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8493328094482422},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7833297252655029},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7129772901535034},{"id":"https://openalex.org/C148524875","wikidata":"https://www.wikidata.org/wiki/Q6975395","display_name":"F1 score","level":2,"score":0.623745322227478},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6085036396980286},{"id":"https://openalex.org/C138602881","wikidata":"https://www.wikidata.org/wiki/Q2709591","display_name":"Confusion matrix","level":2,"score":0.5851947069168091},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5737271308898926},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5358193516731262},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.5147304534912109},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.44299885630607605},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.43404027819633484},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4100729823112488},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.3567466735839844},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.346680611371994},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.29618149995803833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15770304203033447},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/imcom53663.2022.9721811","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom53663.2022.9721811","pdf_url":null,"source":{"id":"https://openalex.org/S4363608555","display_name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2076587863","https://openalex.org/W2119046642","https://openalex.org/W2264436257","https://openalex.org/W2606537796","https://openalex.org/W2748868501","https://openalex.org/W2787923712","https://openalex.org/W2801118360","https://openalex.org/W2803167497","https://openalex.org/W2901508923","https://openalex.org/W2909665293","https://openalex.org/W2911505293","https://openalex.org/W2950399464","https://openalex.org/W2980332979","https://openalex.org/W3000094279","https://openalex.org/W3020687048","https://openalex.org/W3024012711","https://openalex.org/W3048123939","https://openalex.org/W3092149785","https://openalex.org/W3095274680","https://openalex.org/W3095531713","https://openalex.org/W3103150840","https://openalex.org/W3124724827","https://openalex.org/W3130705540","https://openalex.org/W3132328672","https://openalex.org/W3136239615","https://openalex.org/W3152708317","https://openalex.org/W3158456479","https://openalex.org/W3195171228","https://openalex.org/W3208382680","https://openalex.org/W4287689466","https://openalex.org/W6743493502","https://openalex.org/W6757774206","https://openalex.org/W6781905506"],"related_works":["https://openalex.org/W3213687907","https://openalex.org/W2744600799","https://openalex.org/W2965019586","https://openalex.org/W3014765288","https://openalex.org/W4372324482","https://openalex.org/W2522937849","https://openalex.org/W3214277069","https://openalex.org/W1584305544","https://openalex.org/W2951631494","https://openalex.org/W2165299150"],"abstract_inverted_index":{"The":[0,96,117],"number":[1],"of":[2,4,31,41,111,166],"Internet":[3],"Things":[5],"(IoT)":[6],"devices":[7],"connected":[8],"to":[9,18,52,87],"the":[10,29,57,61,66,108,112,143,147,151,154],"network":[11],"enlarges":[12],"dramatically":[13],"these":[14],"days.":[15],"This":[16],"leads":[17],"rising":[19],"cyberattacks,":[20],"such":[21],"as":[22],"botnets.":[23],"These":[24],"attacks":[25,55],"result":[26],"in":[27,56,65,142,164],"disrupting":[28],"transition":[30],"networks":[32],"and":[33,45,74,114,136,170],"services":[34],"for":[35,93],"IoT":[36,58,94],"devices.":[37,95],"Recently,":[38],"various":[39],"approaches":[40],"Machine":[42],"Learning":[43,47],"(ML)":[44],"Deep":[46],"(DL)":[48],"have":[49],"been":[50],"proposed":[51,97],"detect":[53],"botnet":[54,90],"environment.":[59],"However,":[60],"ML/DL":[62],"methods":[63],"used":[64,141],"research":[67],"are":[68,140],"just":[69],"binary":[70],"classification":[71,122],"between":[72],"normal":[73],"attack":[75],"classes.":[76],"In":[77],"this":[78],"study,":[79],"we":[80],"propose":[81],"an":[82],"approach":[83,98],"using":[84],"ML":[85],"algorithms":[86],"develop":[88],"multi-classification":[89,104,118,168],"detection":[91],"systems":[92],"is":[99],"based":[100],"on":[101],"not":[102],"only":[103],"metrics":[105,169],"but":[106],"also":[107],"time":[109,171],"complexity":[110],"training":[113],"testing":[115],"processes.":[116],"metrics,":[119],"particularly":[120],"multi-":[121],"confusion":[123],"matrix,":[124],"Accuracy,":[125],"Macro":[126],"F1-score,":[127,129,131],"Micro":[128],"Weighted":[130],"Mathews":[132],"Correlation":[133],"Coefficient":[134],"(MCC),":[135],"Cohen":[137],"Kappa":[138],"score":[139],"entire":[144],"study.":[145],"Through":[146],"extensive":[148],"experiments":[149],"with":[150],"N-BaIoT":[152],"dataset,":[153],"Artificial":[155],"Neural":[156],"Network":[157],"classifier":[158],"has":[159],"proven":[160],"its":[161],"robust":[162],"performance":[163],"terms":[165],"both":[167],"complexity.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
