{"id":"https://openalex.org/W2522323897","doi":"https://doi.org/10.1109/ssic.2016.7571810","title":"Clustering methods comparison: Application to source based detection of botclouds","display_name":"Clustering methods comparison: Application to source based detection of botclouds","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2522323897","doi":"https://doi.org/10.1109/ssic.2016.7571810","mag":"2522323897"},"language":"en","primary_location":{"id":"doi:10.1109/ssic.2016.7571810","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssic.2016.7571810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043492852","display_name":"Badis Hammi","orcid":"https://orcid.org/0000-0002-4470-6406"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Badis Hammi","raw_affiliation_strings":["Telecom ParisTech"],"affiliations":[{"raw_affiliation_string":"Telecom ParisTech","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036808065","display_name":"Mohamed Cherif Rahal","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108314","display_name":"VeDeCoM Institute","ror":"https://ror.org/01ssrp339","country_code":"FR","type":"facility","lineage":["https://openalex.org/I4210108314"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohamed Cherif Rahal","raw_affiliation_strings":["VEDECOM"],"affiliations":[{"raw_affiliation_string":"VEDECOM","institution_ids":["https://openalex.org/I4210108314"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109225807","display_name":"Rida Khatoun","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Rida Khatoun","raw_affiliation_strings":["Telecom ParisTech"],"affiliations":[{"raw_affiliation_string":"Telecom ParisTech","institution_ids":["https://openalex.org/I12356871"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043492852"],"corresponding_institution_ids":["https://openalex.org/I12356871"],"apc_list":null,"apc_paid":null,"fwci":0.89560553,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79359408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"ix","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9549239873886108},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8860916495323181},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7493140697479248},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6982245445251465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.696337103843689},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6364051699638367},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6349501609802246},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4583316445350647},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.44671934843063354},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.42580854892730713},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.42109215259552},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.22008007764816284},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2174336016178131},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2016659379005432},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09313496947288513},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.06786447763442993},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06310361623764038}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9549239873886108},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8860916495323181},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7493140697479248},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6982245445251465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.696337103843689},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6364051699638367},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6349501609802246},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4583316445350647},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.44671934843063354},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.42580854892730713},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.42109215259552},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.22008007764816284},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2174336016178131},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2016659379005432},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09313496947288513},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.06786447763442993},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06310361623764038},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ssic.2016.7571810","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssic.2016.7571810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W87092222","https://openalex.org/W96773931","https://openalex.org/W97681402","https://openalex.org/W1485824465","https://openalex.org/W1615970822","https://openalex.org/W1971246165","https://openalex.org/W1988933354","https://openalex.org/W1992713826","https://openalex.org/W2011430131","https://openalex.org/W2180027489","https://openalex.org/W2186351131","https://openalex.org/W2482589566","https://openalex.org/W2565737235","https://openalex.org/W4245508239","https://openalex.org/W6603884431"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W4230824443","https://openalex.org/W2292210693","https://openalex.org/W2097156747"],"abstract_inverted_index":{"Recently,":[0],"cloud":[1,21],"computing":[2,22],"has":[3],"conquered":[4],"IT":[5,19],"markets":[6],"and":[7,27,32,51,57,100,113],"majority":[8],"of":[9,44,65,80,117,123],"institutions":[10],"use":[11],"its":[12],"services":[13],"at":[14],"different":[15],"scales.":[16],"As":[17],"any":[18],"technology,":[20],"suffers":[23],"from":[24,54],"security":[25,53],"issues":[26],"numerous":[28,102],"studies":[29],"were":[30],"-":[31,35],"in":[33,37,83,109,120,129],"progress":[34],"given":[36],"order":[38,110],"to":[39,111],"overcome":[40],"them.":[41],"However,":[42],"most":[43],"the":[45,63,67,78,84,115,121,130],"latter":[46],"focus":[47,61],"on":[48,62,96],"data,":[49],"users":[50],"infrastructure":[52,69,99],"external":[55],"attacks,":[56],"very":[58],"few":[59],"ones":[60],"issue":[64,79],"using":[66],"cloud's":[68],"as":[70],"an":[71,88],"attack":[72],"tool":[73],"or":[74],"support.":[75],"To":[76],"address":[77],"botnets":[81,128],"hosted":[82],"cloud,":[85],"we":[86,92],"realized":[87,101],"experimental":[89],"campaign":[90],"where":[91],"implemented":[93],"a":[94,97],"botnet":[95],"virtualized":[98],"attacks.":[103],"The":[104],"collected":[105],"data":[106],"was":[107],"exploited":[108],"study":[112],"compare":[114],"effectiveness":[116],"clustering":[118],"methods":[119],"detection":[122],"DDoS":[124],"attacks":[125],"generated":[126],"by":[127],"cloud.":[131]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
