{"id":"https://openalex.org/W3034233059","doi":"https://doi.org/10.1109/noms47738.2020.9110462","title":"HGDom: Heterogeneous Graph Convolutional Networks for Malicious Domain Detection","display_name":"HGDom: Heterogeneous Graph Convolutional Networks for Malicious Domain Detection","publication_year":2020,"publication_date":"2020-04-01","ids":{"openalex":"https://openalex.org/W3034233059","doi":"https://doi.org/10.1109/noms47738.2020.9110462","mag":"3034233059"},"language":"en","primary_location":{"id":"doi:10.1109/noms47738.2020.9110462","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms47738.2020.9110462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101132107","display_name":"Sun Xiao-qing","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiaoqing Sun","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, National Research Center for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, National Research Center for Information Science and Technology, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023416195","display_name":"Jiahai Yang","orcid":"https://orcid.org/0000-0001-6109-6737"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiahai Yang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, National Research Center for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, National Research Center for Information Science and Technology, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100343127","display_name":"Zhiliang Wang","orcid":"https://orcid.org/0000-0001-6587-820X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhiliang Wang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, National Research Center for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, National Research Center for Information Science and Technology, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100392542","display_name":"Heng Liu","orcid":"https://orcid.org/0000-0003-3923-7526"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Heng Liu","raw_affiliation_strings":["China Electronics Cyberspace Great Wall Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Electronics Cyberspace Great Wall Co., Ltd, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101132107"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4167,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.89451524,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8841116428375244},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5677253007888794},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5576860308647156},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5211703777313232},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4331362247467041},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4261380434036255},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.42072486877441406},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37495094537734985},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3419875502586365},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3300786018371582},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3173242211341858}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8841116428375244},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5677253007888794},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5576860308647156},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5211703777313232},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4331362247467041},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4261380434036255},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.42072486877441406},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37495094537734985},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3419875502586365},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3300786018371582},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3173242211341858},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms47738.2020.9110462","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms47738.2020.9110462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W103340358","https://openalex.org/W155384935","https://openalex.org/W1498756827","https://openalex.org/W1548361610","https://openalex.org/W1561983441","https://openalex.org/W1983776999","https://openalex.org/W2062797058","https://openalex.org/W2082550445","https://openalex.org/W2110983102","https://openalex.org/W2145658888","https://openalex.org/W2149288670","https://openalex.org/W2154851992","https://openalex.org/W2396855773","https://openalex.org/W2401054255","https://openalex.org/W2464432954","https://openalex.org/W2519887557","https://openalex.org/W2528572867","https://openalex.org/W2546547051","https://openalex.org/W2606780347","https://openalex.org/W2743104969","https://openalex.org/W2767774008","https://openalex.org/W2789553392","https://openalex.org/W2804240301","https://openalex.org/W2807021761","https://openalex.org/W2883803180","https://openalex.org/W2889547652","https://openalex.org/W2891621711","https://openalex.org/W2963758104","https://openalex.org/W2963919031","https://openalex.org/W2964015378","https://openalex.org/W2964051675","https://openalex.org/W2968390691","https://openalex.org/W2969333022","https://openalex.org/W2973385958","https://openalex.org/W2987119394","https://openalex.org/W3100848837","https://openalex.org/W3104097132","https://openalex.org/W3104717349","https://openalex.org/W4210257598","https://openalex.org/W6606342502","https://openalex.org/W6633578641","https://openalex.org/W6713023146","https://openalex.org/W6719105664","https://openalex.org/W6726873649","https://openalex.org/W6729323343","https://openalex.org/W6736685754","https://openalex.org/W6748141922","https://openalex.org/W6753360119","https://openalex.org/W6755170156","https://openalex.org/W6767173058","https://openalex.org/W6807384801"],"related_works":["https://openalex.org/W2357256365","https://openalex.org/W2348502264","https://openalex.org/W2365486383","https://openalex.org/W2362059367","https://openalex.org/W2901443725","https://openalex.org/W2350084742","https://openalex.org/W2357988862","https://openalex.org/W1855558850","https://openalex.org/W2353819887","https://openalex.org/W1852677413"],"abstract_inverted_index":{"As":[0],"a":[1,66,96,109,116],"fundamental":[2],"component":[3],"of":[4,168],"the":[5,81,103,126,132,141,164,185],"Internet,":[6],"Domain":[7],"Name":[8],"System":[9],"(DNS)":[10],"is":[11,140,187],"widely":[12],"abused":[13],"by":[14],"attackers":[15],"in":[16,26,129,147,192],"various":[17],"cybercrimes,":[18],"making":[19],"malicious":[20,60],"domain":[21,61,76],"detection":[22,47,62],"an":[23,56],"essential":[24],"task":[25],"network":[27,70,197],"defenses.":[28],"However,":[29],"some":[30,44],"well-crafted":[31],"attacks":[32],"with":[33,181,196],"tricky":[34],"techniques":[35],"can":[36,121],"not":[37],"only":[38],"bypass":[39],"blacklists":[40],"but":[41],"also":[42],"make":[43],"machine":[45],"learning-based":[46],"systems":[48],"infeasible.":[49],"In":[50],"this":[51,139],"paper,":[52],"we":[53,73,94,107],"design":[54],"HGDom,":[55],"accurate":[57],"and":[58,87,125,158,166],"robust":[59],"system":[63,186],"based":[64],"on":[65],"heterogeneous":[67],"graph":[68,127],"convolutional":[69],"method.":[71],"First,":[72],"jointly":[74],"analyze":[75],"features":[77,124],"as":[78,80],"well":[79],"complex":[82],"relations":[83],"among":[84],"domains,":[85],"clients,":[86],"IP":[88],"addresses.":[89],"To":[90,135],"capture":[91],"richer":[92],"information,":[93],"introduce":[95],"Heterogeneous":[97],"Information":[98],"Network":[99],"(HIN)":[100],"to":[101,144,162,189,194],"model":[102],"DNS":[104,154],"scene.":[105],"Then,":[106],"propose":[108],"novel":[110],"representation":[111],"method":[112],"named":[113],"MAGCN.":[114],"With":[115],"meta-path-based":[117],"attention":[118],"mechanism,":[119],"it":[120],"handle":[122],"node":[123],"structure":[128],"HIN":[130],"at":[131],"same":[133],"time.":[134],"our":[136,169],"best":[137],"knowledge,":[138],"first":[142],"work":[143],"apply":[145],"GCN":[146],"cyber":[148],"security":[149,198],"analysis.":[150],"Comprehensive":[151],"experiments":[152],"over":[153],"data":[155],"from":[156],"TUNET":[157],"CERNET2":[159],"are":[160],"conducted":[161],"validate":[163],"effectiveness":[165],"superiority":[167],"proposed":[170],"methods.":[171],"The":[172],"comparison":[173],"results":[174],"show":[175],"that":[176],"HGDom":[177],"outperforms":[178],"state-of-the-art":[179],"approaches":[180],"promising":[182],"performance.":[183],"Besides,":[184],"decided":[188],"be":[190],"deployed":[191],"production":[193],"assist":[195],"management":[199],"for":[200],"CERNET2.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
