{"id":"https://openalex.org/W4387760992","doi":"https://doi.org/10.1109/ipccc59175.2023.10253882","title":"IoT Botnet Classification using CNN-based Deep Learning","display_name":"IoT Botnet Classification using CNN-based Deep Learning","publication_year":2023,"publication_date":"2023-10-18","ids":{"openalex":"https://openalex.org/W4387760992","doi":"https://doi.org/10.1109/ipccc59175.2023.10253882"},"language":"en","primary_location":{"id":"doi:10.1109/ipccc59175.2023.10253882","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc59175.2023.10253882","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045582103","display_name":"Nahid Ebrahimi Majd","orcid":null},"institutions":[{"id":"https://openalex.org/I226560621","display_name":"California State University, San Marcos","ror":"https://ror.org/01j8e0j24","country_code":"US","type":"education","lineage":["https://openalex.org/I226560621"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nahid Ebrahimi Majd","raw_affiliation_strings":["California State University,Department of Computer Science and Information Systems,San Marcos,United States","Department of Computer Science and Information Systems, California State University, San Marcos, United States"],"affiliations":[{"raw_affiliation_string":"California State University,Department of Computer Science and Information Systems,San Marcos,United States","institution_ids":["https://openalex.org/I226560621"]},{"raw_affiliation_string":"Department of Computer Science and Information Systems, California State University, San Marcos, United States","institution_ids":["https://openalex.org/I226560621"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5093089933","display_name":"Dhatri Sai Kumar Reddy Gudipelly","orcid":null},"institutions":[{"id":"https://openalex.org/I226560621","display_name":"California State University, San Marcos","ror":"https://ror.org/01j8e0j24","country_code":"US","type":"education","lineage":["https://openalex.org/I226560621"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dhatri Sai Kumar Reddy Gudipelly","raw_affiliation_strings":["California State University,Department of Computer Science and Information Systems,San Marcos,United States","Department of Computer Science and Information Systems, California State University, San Marcos, United States"],"affiliations":[{"raw_affiliation_string":"California State University,Department of Computer Science and Information Systems,San Marcos,United States","institution_ids":["https://openalex.org/I226560621"]},{"raw_affiliation_string":"Department of Computer Science and Information Systems, California State University, San Marcos, United States","institution_ids":["https://openalex.org/I226560621"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045582103"],"corresponding_institution_ids":["https://openalex.org/I226560621"],"apc_list":null,"apc_paid":null,"fwci":0.6019,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69132717,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"46","last_page":"51"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9616473913192749},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7874565720558167},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6264477968215942},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6242818832397461},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6007207632064819},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49286484718322754},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.4303112328052521},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3846200406551361},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1733313500881195},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12488901615142822}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9616473913192749},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7874565720558167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6264477968215942},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6242818832397461},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6007207632064819},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49286484718322754},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.4303112328052521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3846200406551361},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1733313500881195},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12488901615142822},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipccc59175.2023.10253882","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc59175.2023.10253882","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2799758613","https://openalex.org/W2956839102","https://openalex.org/W3047314667","https://openalex.org/W3092149785","https://openalex.org/W3093556640","https://openalex.org/W3122864121","https://openalex.org/W3185153723","https://openalex.org/W4306763827"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W2901835651","https://openalex.org/W3005861778","https://openalex.org/W2883616266","https://openalex.org/W186576250","https://openalex.org/W2372254325","https://openalex.org/W2185627654","https://openalex.org/W13127727","https://openalex.org/W4380075502"],"abstract_inverted_index":{"The":[0,185],"size":[1],"and":[2,90,155,163,176,181,202],"scope":[3],"of":[4,24,32,54,85,113,127,158,179,199],"using":[5,167],"IoT":[6,36,51,59,70,80,86,114,122,151],"has":[7],"been":[8,46],"rapidly":[9],"growing":[10],"in":[11,21,121,136,197],"the":[12,25,30,50,55,108,150,193],"past":[13],"few":[14],"years.":[15],"This":[16,72],"growth":[17],"rises":[18],"security":[19],"challenges":[20],"networks.":[22],"One":[23],"pressing":[26],"concerns":[27],"is":[28,73,118],"detecting":[29],"type":[31,112],"attacks":[33],"emanated":[34],"from":[35,110],"devices.":[37],"To":[38],"tackle":[39],"this":[40,99],"issue,":[41],"machine":[42],"learning":[43,144],"solutions":[44,57],"have":[45],"proposed":[47,195],"that":[48,106,189],"classify":[49,149],"traffic.":[52],"Most":[53],"current":[56],"on":[58],"botnet":[60,138,159,183],"attack":[61],"family":[62,145],"classification":[63,146],"propose":[64,102,141],"a":[65,75,83,103,124],"separate":[66],"model":[67,105],"for":[68,78,173],"each":[69],"device.":[71,115],"not":[74],"suitable":[76],"approach":[77,117],"an":[79],"ecosystem":[81],"where":[82],"variety":[84],"devices":[87,129],"are":[88,94],"used":[89,135],"new":[91],"device":[92],"types":[93,157,178],"introduced":[95],"every":[96],"day.":[97],"In":[98],"research,":[100],"we":[101],"united":[104],"classifies":[107],"traffic":[109,152,175],"any":[111],"Such":[116],"especially":[119],"essential":[120],"as":[123],"large":[125],"number":[126],"different":[128,156],"could":[130],"be":[131,134],"infected":[132],"to":[133,153],"large-scale":[137],"attacks.":[139,160,184],"We":[140,161],"CNN-based":[142],"deep":[143],"models,":[147],"which":[148,170],"benign":[154,174],"trained":[162],"tested":[164],"our":[165,190],"models":[166,191,196],"N-BaIoT":[168],"dataset,":[169],"contains":[171],"data":[172],"10":[177],"BashLite":[180],"Mirai":[182],"experimental":[186],"results":[187],"demonstrate":[188],"outperform":[192],"related":[194],"terms":[198],"accuracy,":[200],"precision,":[201],"recall.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
