{"id":"https://openalex.org/W2426227574","doi":"https://doi.org/10.1109/tifs.2017.2692685","title":"DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies","display_name":"DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies","publication_year":2017,"publication_date":"2017-04-12","ids":{"openalex":"https://openalex.org/W2426227574","doi":"https://doi.org/10.1109/tifs.2017.2692685","mag":"2426227574"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2692685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2692685","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1606.03986","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033752533","display_name":"Vincenzo Matta","orcid":"https://orcid.org/0000-0002-2046-4027"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Vincenzo Matta","raw_affiliation_strings":["DIEM, University of Salerno, Fisciano, Italy","DIEM, University of Salerno, Fisciano, Italy#TAB#"],"affiliations":[{"raw_affiliation_string":"DIEM, University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]},{"raw_affiliation_string":"DIEM, University of Salerno, Fisciano, Italy#TAB#","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004266537","display_name":"Mario Di Mauro","orcid":"https://orcid.org/0000-0001-6574-2601"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mario Di Mauro","raw_affiliation_strings":["DIEM, University of Salerno, Fisciano, Italy","DIEM, University of Salerno, Fisciano, Italy#TAB#"],"affiliations":[{"raw_affiliation_string":"DIEM, University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]},{"raw_affiliation_string":"DIEM, University of Salerno, Fisciano, Italy#TAB#","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078388590","display_name":"M. Longo","orcid":"https://orcid.org/0000-0001-8325-4003"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Maurizio Longo","raw_affiliation_strings":["DIEM, University of Salerno, Fisciano, Italy","DIEM, University of Salerno, Fisciano, Italy#TAB#"],"affiliations":[{"raw_affiliation_string":"DIEM, University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]},{"raw_affiliation_string":"DIEM, University of Salerno, Fisciano, Italy#TAB#","institution_ids":["https://openalex.org/I131729948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033752533"],"corresponding_institution_ids":["https://openalex.org/I131729948"],"apc_list":null,"apc_paid":null,"fwci":0.219,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.5471793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"12","issue":"8","first_page":"1844","last_page":"1859"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9893581867218018},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9161882996559143},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7350111603736877},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6741774082183838},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6468868255615234},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6106842756271362},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4997732639312744},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.420910120010376},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3282545506954193},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.301296591758728},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14116665720939636},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11646950244903564}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9893581867218018},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9161882996559143},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7350111603736877},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6741774082183838},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6468868255615234},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6106842756271362},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4997732639312744},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.420910120010376},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3282545506954193},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.301296591758728},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14116665720939636},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11646950244903564},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tifs.2017.2692685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2692685","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1606.03986","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1606.03986","pdf_url":"https://arxiv.org/pdf/1606.03986","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2426227574","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1606.03986.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1606.03986","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1606.03986","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1606.03986","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1606.03986","pdf_url":"https://arxiv.org/pdf/1606.03986","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2426227574.pdf","grobid_xml":"https://content.openalex.org/works/W2426227574.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1648822776","https://openalex.org/W1972771043","https://openalex.org/W2046135376","https://openalex.org/W2058737544","https://openalex.org/W2094745658","https://openalex.org/W2106796827","https://openalex.org/W2113183909","https://openalex.org/W2116478700","https://openalex.org/W2119227347","https://openalex.org/W2123269507","https://openalex.org/W2126384258","https://openalex.org/W2128944612","https://openalex.org/W2137345105","https://openalex.org/W2140738143","https://openalex.org/W2146189323","https://openalex.org/W2149463733","https://openalex.org/W2164446240","https://openalex.org/W2167008044","https://openalex.org/W2168955340","https://openalex.org/W2169751441","https://openalex.org/W2562218166","https://openalex.org/W2963965856","https://openalex.org/W4249446031","https://openalex.org/W6633579689"],"related_works":["https://openalex.org/W2963897534","https://openalex.org/W2562218166","https://openalex.org/W3132742126","https://openalex.org/W2165322489","https://openalex.org/W1512743466","https://openalex.org/W3164495816","https://openalex.org/W3081534155","https://openalex.org/W2565045400","https://openalex.org/W2284078694","https://openalex.org/W2012917383","https://openalex.org/W2883062872","https://openalex.org/W3174147988","https://openalex.org/W2891929340","https://openalex.org/W2191989567","https://openalex.org/W2996707693","https://openalex.org/W2798996047","https://openalex.org/W2897664178","https://openalex.org/W2790247732","https://openalex.org/W3166939084","https://openalex.org/W2507459700"],"abstract_inverted_index":{"Distributed":[0],"Denial-of-Service":[1],"(DDoS)":[2],"attacks":[3,45],"are":[4],"usually":[5],"launched":[6],"through":[7],"the":[8,17,33,37,41,48,53,77,105,111,122,140,148,153,159,162,179,189,206],"botnet,":[9],"an":[10,27,101,127,185],"\u201carmy\u201d":[11],"of":[12,32,44,55,108,147,161,177,191],"compromised":[13,38],"nodes":[14],"hidden":[15,151],"in":[16,152,188],"network.":[18],"Inferential":[19],"tools":[20,78],"for":[21,104,174],"DDoS":[22,88],"mitigation":[23],"should":[24],"accordingly":[25],"enable":[26],"early":[28],"and":[29,155],"reliable":[30],"discrimination":[31],"normal":[34,114,207],"users":[35],"from":[36,121],"ones.":[39],"Unfortunately,":[40],"recent":[42],"emergence":[43],"performed":[46],"at":[47],"application":[49],"layer":[50],"has":[51],"multiplied":[52],"number":[54],"possibilities":[56],"that":[57,79,130],"a":[58,135,167],"botnet":[59,112,149,181],"can":[60],"exploit":[61],"to":[62,86,133,139,198],"conceal":[63],"its":[64],"malicious":[65],"activities.":[66],"New":[67],"challenges":[68],"arise,":[69],"which":[70],"cannot":[71],"be":[72],"addressed":[73],"by":[74,116],"simply":[75],"borrowing":[76],"have":[80],"been":[81],"successfully":[82],"applied":[83],"so":[84],"far":[85],"earlier":[87],"paradigms.":[89],"In":[90],"this":[91],"paper,":[92],"we":[93,99,125,157],"offer":[94],"basically":[95],"three":[96],"contributions:":[97],"1)":[98],"introduce":[100],"abstract":[102],"model":[103],"aforementioned":[106],"class":[107],"attacks,":[109],"where":[110],"emulates":[113],"traffic":[115],"continually":[117],"learning":[118],"admissible":[119],"patterns":[120],"environment;":[123],"2)":[124],"devise":[126],"inference":[128],"algorithm":[129,183],"is":[131],"shown":[132],"provide":[134],"consistent":[136],"(i.e.,":[137],"converging":[138],"true":[141],"solution":[142],"as":[143],"time":[144,187],"elapses)":[145],"estimate":[146],"possibly":[150],"network;":[154],"3)":[156],"verify":[158],"validity":[160],"proposed":[163,180],"inferential":[164],"strategy":[165],"on":[166],"test-bed":[168],"environment.":[169],"Our":[170],"tests":[171],"show":[172],"that,":[173],"several":[175],"scenarios":[176],"implementation,":[178],"identification":[182],"needs":[184],"observation":[186],"order":[190],"(or":[192],"even":[193],"less":[194],"than)":[195],"1":[196],"min":[197],"identify":[199],"correctly":[200],"almost":[201],"all":[202],"bots,":[203],"without":[204],"affecting":[205],"users'":[208],"activity.":[209]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
