{"id":"https://openalex.org/W4383753505","doi":"https://doi.org/10.1109/tifs.2023.3293956","title":"ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability","display_name":"ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4383753505","doi":"https://doi.org/10.1109/tifs.2023.3293956"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3293956","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3293956","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","Ministry of Education of China, Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Ministry of Education of China, Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353550","display_name":"Hao Chen","orcid":"https://orcid.org/0000-0002-4072-0710"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100339715","display_name":"Miao Li","orcid":"https://orcid.org/0000-0002-9623-9379"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Miao Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665328","display_name":"Ruidong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I10091056","display_name":"Kanazawa University","ror":"https://ror.org/02hwp6a56","country_code":"JP","type":"education","lineage":["https://openalex.org/I10091056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ruidong Li","raw_affiliation_strings":["Institute of Science and Engineering, Kanazawa University, Kakuma, Japan","Institute of Science and Engineering, Kanazawa University, Kakuma, Kanazawa, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Science and Engineering, Kanazawa University, Kakuma, Japan","institution_ids":["https://openalex.org/I10091056"]},{"raw_affiliation_string":"Institute of Science and Engineering, Kanazawa University, Kakuma, Kanazawa, Japan","institution_ids":["https://openalex.org/I10091056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034831625","display_name":"Yali Yuan","orcid":"https://orcid.org/0000-0002-9258-9929"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yali Yuan","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5073150709"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":3.6614,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.94373224,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"18","issue":null,"first_page":"4406","last_page":"4421"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8434129953384399},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7262108325958252},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.671473503112793},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6464735269546509},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.607242226600647},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5452587604522705},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5146244764328003},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.478456974029541},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3880293071269989},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.37039706110954285},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09145495295524597}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8434129953384399},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7262108325958252},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.671473503112793},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6464735269546509},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.607242226600647},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5452587604522705},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5146244764328003},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.478456974029541},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3880293071269989},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.37039706110954285},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09145495295524597},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3293956","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3293956","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3946546080","display_name":null,"funder_award_id":"62172093","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6794526321","display_name":null,"funder_award_id":"61602114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1981294881","https://openalex.org/W2064675550","https://openalex.org/W2134557905","https://openalex.org/W2143612262","https://openalex.org/W2157825442","https://openalex.org/W2170505850","https://openalex.org/W2470894770","https://openalex.org/W2528572867","https://openalex.org/W2546910111","https://openalex.org/W2556605533","https://openalex.org/W2588126298","https://openalex.org/W2729537186","https://openalex.org/W2768793959","https://openalex.org/W2773671123","https://openalex.org/W2784291098","https://openalex.org/W2802296803","https://openalex.org/W2804240301","https://openalex.org/W2890928763","https://openalex.org/W2912464539","https://openalex.org/W2917298693","https://openalex.org/W2942650110","https://openalex.org/W2954590176","https://openalex.org/W2995774794","https://openalex.org/W3014018380","https://openalex.org/W3085382268","https://openalex.org/W3133309708","https://openalex.org/W3139210187","https://openalex.org/W3192856967","https://openalex.org/W4210598630","https://openalex.org/W6633578641","https://openalex.org/W6640663528","https://openalex.org/W6685053522","https://openalex.org/W6719105664","https://openalex.org/W6729497825","https://openalex.org/W6754281715"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2616994865","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2883616266","https://openalex.org/W2388837172"],"abstract_inverted_index":{"Botnets":[0],"extensively":[1,26],"leverage":[2],"Domain":[3],"Generation":[4],"Algorithms":[5],"(DGAs)":[6],"to":[7,28,48,87,113,139],"establish":[8],"reliable":[9],"communication":[10],"channels":[11],"between":[12,143],"bots":[13],"and":[14,16,30,123,146,173,184,199],"Command":[15],"Control":[17],"(C&C)":[18],"servers.":[19],"Numerous":[20],"character-level":[21,159,208],"DGA":[22,50,62,81,97,160,201],"classifiers":[23,161,202],"have":[24,45,59],"been":[25,46],"studied":[27],"detect":[29],"classify":[31],"domain":[32,42,55,107,121,132,148,168,211],"names":[33,108,122,169],"generated":[34,147,170],"by":[35,167,171],"DGAs.":[36],"Meanwhile,":[37],"a":[38,73,102],"series":[39],"of":[40,94,128,189,210],"adversarial":[41,80,177],"generation":[43,57],"algorithms":[44,58],"proposed":[47],"evade":[49],"classifiers.":[51,98],"Although":[52],"the":[53,95,110,115,136,141,144,175,192],"existing":[54],"name":[56,133],"progressed":[60],"against":[61],"classifier,":[63],"their":[64],"anti-detection":[65,84,180],"abilities":[66],"are":[67,165],"still":[68],"weak.":[69],"This":[70],"paper":[71],"proposes":[72],"Bidirectional":[74],"Long":[75],"Short-Term":[76],"Memory":[77],"(BiLSTM)":[78],"network-based":[79],"with":[82],"high":[83],"ability,":[85,181],"referred":[86],"as":[88],"ReplaceDGA.":[89],"ReplaceDGA":[90,155,172,190],"requires":[91],"no":[92],"knowledge":[93],"targeted":[96],"It":[99],"first":[100],"builds":[101],"prediction":[103,137],"model":[104,114,138],"for":[105,195],"benign":[106,120,131,145],"using":[109],"BiLSTM":[111],"network":[112],"semantic":[116],"relationship":[117],"hidden":[118],"within":[119],"then":[124],"replaces":[125],"two":[126],"characters":[127],"each":[129],"input":[130],"based":[134],"on":[135],"maximize":[140],"similarity":[142],"names.":[149,212],"Our":[150,187],"experimental":[151],"results":[152],"validate":[153],"that":[154,203],"successfully":[156],"evades":[157],"various":[158],"even":[162],"after":[163],"they":[164],"retrained":[166],"outperforms":[174],"state-of-the-art":[176],"DGAs":[178],"in":[179],"repetition":[182],"rate,":[183],"collision":[185],"rate.":[186],"study":[188],"promotes":[191],"urgent":[193],"need":[194],"developing":[196],"more":[197],"comprehensive":[198],"robust":[200],"consider":[204],"other":[205],"factors":[206],"besides":[207],"information":[209]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
