{"id":"https://openalex.org/W3049465447","doi":"https://doi.org/10.1109/netsoft48620.2020.9165381","title":"IoT Malware Network Traffic Classification using Visual Representation and Deep Learning","display_name":"IoT Malware Network Traffic Classification using Visual Representation and Deep Learning","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3049465447","doi":"https://doi.org/10.1109/netsoft48620.2020.9165381","mag":"3049465447"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft48620.2020.9165381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2010.01712","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045223903","display_name":"Gueltoum Bendiab","orcid":"https://orcid.org/0000-0002-9843-5496"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Gueltoum Bendiab","raw_affiliation_strings":["Cyber Security Research Group, University of Portsmouth, Portsmouth, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group, University of Portsmouth, Portsmouth, UK","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004375212","display_name":"Stavros Shiaeles","orcid":"https://orcid.org/0000-0003-3866-0672"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Stavros Shiaeles","raw_affiliation_strings":["Cyber Security Research Group, University of Portsmouth, Portsmouth, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group, University of Portsmouth, Portsmouth, UK","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050269424","display_name":"Abdulrahman Alruban","orcid":"https://orcid.org/0000-0002-7295-5194"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Abdulrahman Alruban","raw_affiliation_strings":["CSCAN, University of Plymouth, Plymouth, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CSCAN, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054122221","display_name":"Nicholas Kolokotronis","orcid":"https://orcid.org/0000-0003-0660-8431"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Nicholas Kolokotronis","raw_affiliation_strings":["Department of Informatics and Telecommunications, University of Peloponnese, Tripolis, Greece"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Informatics and Telecommunications, University of Peloponnese, Tripolis, Greece","institution_ids":["https://openalex.org/I158716096"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045223903"],"corresponding_institution_ids":["https://openalex.org/I63072094"],"apc_list":null,"apc_paid":null,"fwci":9.3924,"has_fulltext":true,"cited_by_count":99,"citation_normalized_percentile":{"value":0.98217679,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"444","last_page":"449"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7952979803085327},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7435262203216553},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.623639702796936},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5749024748802185},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5485246777534485},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.43547433614730835},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4152408540248871},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2452528476715088},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1726894974708557},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1263100504875183}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7952979803085327},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7435262203216553},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.623639702796936},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5749024748802185},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5485246777534485},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.43547433614730835},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4152408540248871},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2452528476715088},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1726894974708557},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1263100504875183},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/netsoft48620.2020.9165381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2010.01712","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2010.01712","pdf_url":"https://arxiv.org/pdf/2010.01712","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:researchportal.port.ac.uk:publications/2aed97f0-891d-4089-8141-79c0e7324ddd","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85091976664&partnerID=8YFLogxK","pdf_url":"https://researchportal.port.ac.uk/portal/en/publications/iot-malware-network-traffic-classification-using-visual-representation-and-deep-learning(2aed97f0-891d-4089-8141-79c0e7324ddd).html","source":{"id":"https://openalex.org/S4306401774","display_name":"Portsmouth Research Portal (University of Portsmouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63072094","host_organization_name":"University of Portsmouth","host_organization_lineage":["https://openalex.org/I63072094"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2010.01712","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2010.01712","pdf_url":"https://arxiv.org/pdf/2010.01712","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W181537749","https://openalex.org/W1959608418","https://openalex.org/W1968327128","https://openalex.org/W1980529734","https://openalex.org/W2016258134","https://openalex.org/W2041282815","https://openalex.org/W2099940443","https://openalex.org/W2194775991","https://openalex.org/W2200832203","https://openalex.org/W2238333545","https://openalex.org/W2278186031","https://openalex.org/W2302255633","https://openalex.org/W2528827134","https://openalex.org/W2560666832","https://openalex.org/W2562908385","https://openalex.org/W2564566221","https://openalex.org/W2584221784","https://openalex.org/W2733765803","https://openalex.org/W2748868501","https://openalex.org/W2756489700","https://openalex.org/W2769954494","https://openalex.org/W2774161712","https://openalex.org/W2792186710","https://openalex.org/W2858044321","https://openalex.org/W2929136816","https://openalex.org/W2936870844","https://openalex.org/W2951004968","https://openalex.org/W2958447056","https://openalex.org/W2964054038","https://openalex.org/W2972542656","https://openalex.org/W3198804887","https://openalex.org/W4247128285","https://openalex.org/W6687883403","https://openalex.org/W6732883638","https://openalex.org/W6743493502","https://openalex.org/W6744671649"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W4380075502"],"abstract_inverted_index":{"With":[0],"the":[1,109,114,119,128],"increase":[2],"of":[3,24,33,59,67,97,104,121,145,149,165,180],"IoT":[4,81],"devices":[5],"and":[6,22,40,65,89,95,151],"technologies":[7,131],"coming":[8],"into":[9],"service,":[10],"Malware":[11],"has":[12],"risen":[13],"as":[14],"a":[15,30,61,79,139,174],"challenging":[16],"threat":[17],"with":[18,123],"increased":[19],"infection":[20],"rates":[21],"levels":[23],"sophistication.":[25],"Without":[26],"strong":[27],"security":[28,54],"mechanisms,":[29],"huge":[31],"amount":[32],"sensitive":[34],"data":[35],"are":[36,57,70,77,155,170],"exposed":[37],"to":[38,46,127],"vulnerabilities,":[39],"therefore,":[41],"easily":[42],"abused":[43],"by":[44],"cybercriminals":[45],"perform":[47],"several":[48],"illegal":[49],"activities.":[50],"Thus,":[51],"advanced":[52],"network":[53,106,159],"mechanisms":[55],"that":[56,154],"able":[58],"performing":[60],"real-time":[62],"traffic":[63,69,83,107,153,160],"analysis":[64,84],"mitigation":[66],"malicious":[68,105],"required.":[71],"To":[72,133],"address":[73],"this":[74],"challenge,":[75],"we":[76],"proposing":[78],"novel":[80],"malware":[82,99,152,181],"approach":[85,111],"using":[86],"deep":[87,129],"learning":[88,130],"visual":[90],"representation":[91],"for":[92,178],"faster":[93],"detection":[94,103,122,179],"classification":[96],"new":[98],"(zero-day":[100],"malware).":[101],"The":[102,162],"in":[108],"proposed":[110,136],"works":[112],"at":[113],"package":[115],"level,":[116],"reducing":[117],"significantly":[118],"time":[120],"promising":[124],"results":[125,164],"due":[126],"used.":[132],"evaluate":[134],"our":[135],"method":[137],"performance,":[138],"dataset":[140],"is":[141],"constructed":[142],"which":[143],"consists":[144],"1000":[146],"pcap":[147],"files":[148],"normal":[150],"collected":[156],"from":[157],"different":[158],"sources.":[161],"experimental":[163],"Residual":[166],"Neural":[167],"Network":[168],"(ResNet50)":[169],"very":[171],"promising,":[172],"providing":[173],"94.50%":[175],"accuracy":[176],"rate":[177],"traffic.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":25},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":1}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
