{"id":"https://openalex.org/W4283206472","doi":"https://doi.org/10.1109/infocomwkshps54753.2022.9798307","title":"IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine","display_name":"IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine","publication_year":2022,"publication_date":"2022-05-02","ids":{"openalex":"https://openalex.org/W4283206472","doi":"https://doi.org/10.1109/infocomwkshps54753.2022.9798307"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps54753.2022.9798307","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps54753.2022.9798307","pdf_url":null,"source":{"id":"https://openalex.org/S4363607985","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042172127","display_name":"Nasimul Hasan","orcid":null},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Nasimul Hasan","raw_affiliation_strings":["University of Jinan,School of Information Science and Engineering,Jinan,China","Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China","School of Information Science and Engineering, University of Jinan, Jinan, China"],"affiliations":[{"raw_affiliation_string":"University of Jinan,School of Information Science and Engineering,Jinan,China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China","institution_ids":[]},{"raw_affiliation_string":"School of Information Science and Engineering, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044246017","display_name":"Zhenxiang Chen","orcid":"https://orcid.org/0000-0001-9730-768X"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenxiang Chen","raw_affiliation_strings":["University of Jinan,School of Information Science and Engineering,Jinan,China","School of Information Science and Engineering, University of Jinan, Jinan, China","Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China"],"affiliations":[{"raw_affiliation_string":"University of Jinan,School of Information Science and Engineering,Jinan,China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"School of Information Science and Engineering, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066185224","display_name":"Chuan Zhao","orcid":"https://orcid.org/0000-0001-9106-6010"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Zhao","raw_affiliation_strings":["University of Jinan,School of Information Science and Engineering,Jinan,China","School of Information Science and Engineering, University of Jinan, Jinan, China","Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China"],"affiliations":[{"raw_affiliation_string":"University of Jinan,School of Information Science and Engineering,Jinan,China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"School of Information Science and Engineering, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045815991","display_name":"Yuhui Zhu","orcid":"https://orcid.org/0000-0001-7655-7460"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhui Zhu","raw_affiliation_strings":["University of Jinan,School of Information Science and Engineering,Jinan,China","School of Information Science and Engineering, University of Jinan, Jinan, China","Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China"],"affiliations":[{"raw_affiliation_string":"University of Jinan,School of Information Science and Engineering,Jinan,China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"School of Information Science and Engineering, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100331624","display_name":"Cong Liu","orcid":"https://orcid.org/0000-0002-9796-1371"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Liu","raw_affiliation_strings":["University of Jinan,School of Information Science and Engineering,Jinan,China","School of Information Science and Engineering, University of Jinan, Jinan, China","Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China"],"affiliations":[{"raw_affiliation_string":"University of Jinan,School of Information Science and Engineering,Jinan,China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"School of Information Science and Engineering, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5042172127"],"corresponding_institution_ids":["https://openalex.org/I34949971"],"apc_list":null,"apc_paid":null,"fwci":2.1624,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8851342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12676","display_name":"Machine Learning and ELM","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9695061445236206},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7378512024879456},{"id":"https://openalex.org/keywords/extreme-learning-machine","display_name":"Extreme learning machine","score":0.5491126775741577},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.45751139521598816},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42419183254241943},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37343770265579224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35962459444999695},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.19863906502723694},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12909704446792603},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12451207637786865}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9695061445236206},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7378512024879456},{"id":"https://openalex.org/C2780150128","wikidata":"https://www.wikidata.org/wiki/Q21948731","display_name":"Extreme learning machine","level":3,"score":0.5491126775741577},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.45751139521598816},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42419183254241943},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37343770265579224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35962459444999695},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.19863906502723694},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12909704446792603},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12451207637786865}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps54753.2022.9798307","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps54753.2022.9798307","pdf_url":null,"source":{"id":"https://openalex.org/S4363607985","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.41999998688697815}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2058401212","https://openalex.org/W2575270978","https://openalex.org/W2590373591","https://openalex.org/W2799758613","https://openalex.org/W2902209387","https://openalex.org/W2956839102","https://openalex.org/W2980055861","https://openalex.org/W2981856772","https://openalex.org/W2998420555","https://openalex.org/W3013100408","https://openalex.org/W3014102171","https://openalex.org/W3026665694","https://openalex.org/W3082845237","https://openalex.org/W3122864121","https://openalex.org/W3159151987"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W3159690896","https://openalex.org/W4230824443","https://openalex.org/W2945572725","https://openalex.org/W1989286518","https://openalex.org/W2921012173","https://openalex.org/W2758517546","https://openalex.org/W3134680667","https://openalex.org/W2804396347","https://openalex.org/W2185943007"],"abstract_inverted_index":{"IoT":[0,21,38,79,104],"devices":[1,39],"have":[2],"been":[3],"affected":[4],"by":[5],"fundamental":[6],"security":[7],"flaws":[8],"in":[9,151],"recent":[10],"years,":[11],"rendering":[12],"them":[13],"exposed":[14],"to":[15,25,43,49,77,140],"various":[16,41],"threats":[17],"and":[18,31,65,81,118,123],"viruses,":[19],"particularly":[20,150],"botnets.":[22],"In":[23],"contrast":[24],"conventional":[26],"malware":[27],"on":[28,37],"desktop":[29],"computers":[30],"Android,":[32],"heterogeneous":[33],"processor":[34],"architecture":[35],"constraints":[36],"pose":[40],"challenges":[42],"researchers.":[44],"Traditional":[45],"methodologies":[46],"are":[47],"challenging":[48],"apply":[50],"because":[51],"of":[52,63,68,120,129,137,153],"the":[53,66,107,112,154],"IoT\u2019s":[54],"unique":[55],"properties,":[56],"such":[57],"as":[58],"resource-constrained":[59],"devices,":[60],"enormous":[61],"volumes":[62],"data,":[64],"requirement":[67],"real-time":[69],"detection.":[70],"Then":[71],"it":[72,146,159],"proposes":[73],"a":[74,92,135,160],"lightweight":[75],"framework":[76,85,139],"detect":[78],"botnet":[80,82,105,130],"families.":[83],"The":[84,126],"operates":[86],"with":[87],"bot":[88],"behavior":[89],"data":[90],"over":[91,163],"simple":[93],"yet":[94],"effective":[95],"learning":[96],"based":[97],"method":[98],"named":[99],"Extreme":[100],"Learning":[101],"Machine.":[102],"For":[103],"detection,":[106],"experimental":[108],"results":[109],"demonstrate":[110],"that":[111,145],"suggested":[113],"technique":[114],"achieves":[115],"accuracy,":[116],"precision,":[117],"recall":[119],"97.7%,":[121],"97.1%,":[122,124],"respectively.":[125],"detection":[127],"performance":[128],"families":[131],"is":[132],"inspiring.":[133],"Furthermore,":[134],"comparison":[136],"our":[138],"other":[141,164],"current":[142],"approaches":[143],"reveals":[144],"produces":[147],"better":[148],"results,":[149],"terms":[152],"training":[155],"time,":[156],"which":[157],"gives":[158],"considerable":[161],"edge":[162],"learning-based":[165],"methods.":[166]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
