{"id":"https://openalex.org/W2142513018","doi":"https://doi.org/10.1109/noms.2014.6838310","title":"Understanding botclouds from a system perspective: A principal component analysis","display_name":"Understanding botclouds from a system perspective: A principal component analysis","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2142513018","doi":"https://doi.org/10.1109/noms.2014.6838310","mag":"2142513018"},"language":"en","primary_location":{"id":"doi:10.1109/noms.2014.6838310","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2014.6838310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Network Operations and Management Symposium (NOMS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043492852","display_name":"Badis Hammi","orcid":"https://orcid.org/0000-0002-4470-6406"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I140494188","display_name":"Universit\u00e9 de Technologie de Troyes","ror":"https://ror.org/01qhqcj41","country_code":"FR","type":"education","lineage":["https://openalex.org/I140494188"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Hammi Badis","raw_affiliation_strings":["Universit\u00e9 de Technologie de Troyes, UMR CNRS STMR 6279, Troyes Cedex, France","ERA - Environnement de R\u00e9seaux Autonomes (France)"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 de Technologie de Troyes, UMR CNRS STMR 6279, Troyes Cedex, France","institution_ids":["https://openalex.org/I140494188","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"ERA - Environnement de R\u00e9seaux Autonomes (France)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024604995","display_name":"Guillaume Doyen","orcid":"https://orcid.org/0000-0002-9996-0145"},"institutions":[{"id":"https://openalex.org/I140494188","display_name":"Universit\u00e9 de Technologie de Troyes","ror":"https://ror.org/01qhqcj41","country_code":"FR","type":"education","lineage":["https://openalex.org/I140494188"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Guillaume Doyen","raw_affiliation_strings":["Universit\u00e9 de Technologie de Troyes, UMR CNRS STMR 6279, Troyes Cedex, France","ERA - Environnement de R\u00e9seaux Autonomes (France)","MADYNES - Management of dynamic networks and services (France)"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 de Technologie de Troyes, UMR CNRS STMR 6279, Troyes Cedex, France","institution_ids":["https://openalex.org/I140494188","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"ERA - Environnement de R\u00e9seaux Autonomes (France)","institution_ids":[]},{"raw_affiliation_string":"MADYNES - Management of dynamic networks and services (France)","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109225807","display_name":"Rida Khatoun","orcid":null},"institutions":[{"id":"https://openalex.org/I140494188","display_name":"Universit\u00e9 de Technologie de Troyes","ror":"https://ror.org/01qhqcj41","country_code":"FR","type":"education","lineage":["https://openalex.org/I140494188"]},{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210165912","display_name":"Laboratoire Traitement et Communication de l\u2019Information","ror":"https://ror.org/057er4c39","country_code":"FR","type":"facility","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102","https://openalex.org/I4210165912"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Rida Khatoun","raw_affiliation_strings":["Universit\u00e9 de Technologie de Troyes, UMR CNRS STMR 6279, Troyes Cedex, France","LTCI - Laboratoire Traitement et Communication de l'Information (T\u00e9l\u00e9com Paris 19 Place Marguerite Perey 91120 PALAISEAU - France)"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 de Technologie de Troyes, UMR CNRS STMR 6279, Troyes Cedex, France","institution_ids":["https://openalex.org/I140494188","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"LTCI - Laboratoire Traitement et Communication de l'Information (T\u00e9l\u00e9com Paris 19 Place Marguerite Perey 91120 PALAISEAU - France)","institution_ids":["https://openalex.org/I4210165912","https://openalex.org/I12356871"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043492852"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I140494188"],"apc_list":null,"apc_paid":null,"fwci":3.9569,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.94315342,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8145804405212402},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7690591812133789},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7571918964385986},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.708427906036377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6699960231781006},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6646087169647217},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4899079203605652},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4706506133079529},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4561523497104645},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.35327720642089844},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18977099657058716},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13513997197151184}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8145804405212402},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7690591812133789},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7571918964385986},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.708427906036377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6699960231781006},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6646087169647217},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4899079203605652},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4706506133079529},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4561523497104645},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.35327720642089844},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18977099657058716},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13513997197151184},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/noms.2014.6838310","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2014.6838310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Network Operations and Management Symposium (NOMS)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-02274911v1","is_oa":false,"landing_page_url":"https://hal-utt.archives-ouvertes.fr/hal-02274911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:HAL:hal-02342695v1","is_oa":false,"landing_page_url":"https://telecom-paris.hal.science/hal-02342695","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium, May 2014, Krakow, France. pp.1-9, &#x27E8;10.1109/NOMS.2014.6838310&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332178","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W96773931","https://openalex.org/W187043655","https://openalex.org/W802582402","https://openalex.org/W1489073918","https://openalex.org/W1904594683","https://openalex.org/W2000309792","https://openalex.org/W2001586155","https://openalex.org/W2016070752","https://openalex.org/W2018026534","https://openalex.org/W2018671131","https://openalex.org/W2018992824","https://openalex.org/W2047350783","https://openalex.org/W2053449529","https://openalex.org/W2089468765","https://openalex.org/W2102262986","https://openalex.org/W2104692292","https://openalex.org/W2111958600","https://openalex.org/W2120617515","https://openalex.org/W2125212367","https://openalex.org/W2142449826","https://openalex.org/W2155461860","https://openalex.org/W2155883880","https://openalex.org/W2161958717","https://openalex.org/W2165464232","https://openalex.org/W2169768310","https://openalex.org/W2325359287","https://openalex.org/W4302557251","https://openalex.org/W6603884431","https://openalex.org/W6629317036","https://openalex.org/W6682707501","https://openalex.org/W6701408937"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W2901835651","https://openalex.org/W2883616266","https://openalex.org/W186576250","https://openalex.org/W4230824443","https://openalex.org/W2038807247","https://openalex.org/W2097156747","https://openalex.org/W2559738661","https://openalex.org/W2941957272"],"abstract_inverted_index":{"Cloud":[0],"computing":[1],"is":[2,31,111],"gaining":[3],"ground":[4],"and":[5,47,77,126,200,202],"becoming":[6],"one":[7],"of":[8,13,66,136,149,159,166,183,205,222],"the":[9,14,63,120,134,146,164,181,219],"fast":[10,48],"growing":[11],"segments":[12],"IT":[15],"industry.":[16],"However,":[17],"if":[18],"its":[19,45],"numerous":[20],"advantages":[21],"are":[22,61],"mainly":[23],"used":[24,152],"to":[25,50,144,186,227],"support":[26],"a":[27,35,84,107,123,150,154,184,188,213,223],"legitimate":[28,229],"activity,":[29],"it":[30,37,52,115],"now":[32],"exploited":[33],"for":[34,153,173,203],"use":[36,69],"was":[38],"not":[39],"meant":[40],"for:":[41],"malicious":[42,68],"users":[43],"leverage":[44],"power":[46],"provisioning":[49],"turn":[51],"into":[53,103],"an":[54,89,104,137],"attack":[55],"support.":[56],"Botnets":[57],"supporting":[58],"DDoS":[59,155],"attacks":[60,196],"among":[62],"greatest":[64],"beneficiaries":[65],"this":[67,130],"since":[70,114],"they":[71],"can":[72,177],"be":[73,178],"setup":[74],"on":[75,198,212],"demand":[76],"at":[78,119],"very":[79,112],"large":[80],"scale":[81],"without":[82],"requiring":[83],"long":[85],"dissemination":[86],"phase":[87],"nor":[88],"expensive":[90],"deployment":[91],"costs.":[92],"For":[93],"cloud":[94,185],"service":[95],"providers,":[96],"preventing":[97],"their":[98],"infrastructure":[99],"from":[100],"being":[101],"turned":[102],"Attack":[105],"as":[106,225],"Service":[108],"delivery":[109],"model":[110],"challenging":[113],"requires":[116],"detecting":[117],"threats":[118],"source,":[121],"in":[122,142,163,180],"highly":[124],"dynamic":[125],"heterogeneous":[127],"environment.":[128],"In":[129],"paper,":[131],"we":[132,140,207],"present":[133],"result":[135],"experiment":[138],"campaign":[139],"performed":[141],"order":[143],"understand":[145],"operational":[147],"behavior":[148,221],"botcloud":[151,224],"attack.":[156],"The":[157],"originality":[158],"our":[160],"work":[161],"resides":[162],"consideration":[165],"system":[167],"metrics":[168],"that,":[169],"while":[170],"never":[171],"considered":[172],"state-of-the-art":[174],"botnets":[175],"detection,":[176],"leveraged":[179],"context":[182],"enable":[187],"source":[189],"based":[190,197,211],"detection.":[191],"Our":[192],"study":[193],"considers":[194],"both":[195],"TCP-flood":[199],"UDP-storm":[201],"each":[204],"them,":[206],"provide":[208],"statistical":[209],"results":[210],"principal":[214],"component":[215],"analysis,":[216],"that":[217],"highlight":[218],"recognizable":[220],"compared":[226],"other":[228],"workloads.":[230]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
