{"id":"https://openalex.org/W4408222463","doi":"https://doi.org/10.1109/tnse.2025.3548411","title":"A Lightweight Method for Botnet Detection in Internet of Things Environment","display_name":"A Lightweight Method for Botnet Detection in Internet of Things Environment","publication_year":2025,"publication_date":"2025-03-07","ids":{"openalex":"https://openalex.org/W4408222463","doi":"https://doi.org/10.1109/tnse.2025.3548411"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3548411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3548411","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013933583","display_name":"Wei Ma","orcid":"https://orcid.org/0000-0002-7357-1504"},"institutions":[{"id":"https://openalex.org/I198645480","display_name":"North China University of Water Resources and Electric Power","ror":"https://ror.org/03acrzv41","country_code":"CN","type":"education","lineage":["https://openalex.org/I198645480"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Ma","raw_affiliation_strings":["School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7357-1504","affiliations":[{"raw_affiliation_string":"School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou, China","institution_ids":["https://openalex.org/I198645480"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xing Wang","orcid":"https://orcid.org/0000-0002-9608-8400"},"institutions":[{"id":"https://openalex.org/I4401727007","display_name":"Hikvision (China)","ror":"https://ror.org/02jzypx27","country_code":null,"type":"company","lineage":["https://openalex.org/I4401727007"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xing Wang","raw_affiliation_strings":["Hangzhou Hikvision Digital Technology Company Ltd., Hangzhou, China","Hangzhou Hikvision Digital Technology Co., Ltd., Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-9608-8400","affiliations":[{"raw_affiliation_string":"Hangzhou Hikvision Digital Technology Company Ltd., Hangzhou, China","institution_ids":["https://openalex.org/I4401727007"]},{"raw_affiliation_string":"Hangzhou Hikvision Digital Technology Co., Ltd., Hangzhou, China","institution_ids":["https://openalex.org/I4401727007"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jie Dong","orcid":"https://orcid.org/0000-0001-7477-3549"},"institutions":[{"id":"https://openalex.org/I198645480","display_name":"North China University of Water Resources and Electric Power","ror":"https://ror.org/03acrzv41","country_code":"CN","type":"education","lineage":["https://openalex.org/I198645480"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Dong","raw_affiliation_strings":["School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-7477-3549","affiliations":[{"raw_affiliation_string":"School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou, China","institution_ids":["https://openalex.org/I198645480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033364294","display_name":"Mingsheng Hu","orcid":"https://orcid.org/0000-0002-7220-1456"},"institutions":[{"id":"https://openalex.org/I4210092058","display_name":"Zhengzhou Normal University","ror":"https://ror.org/00cbts945","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092058"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingsheng Hu","raw_affiliation_strings":["School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7220-1456","affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou, China","institution_ids":["https://openalex.org/I4210092058"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091337485","display_name":"Qinglei Zhou","orcid":"https://orcid.org/0000-0002-1156-1108"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinglei Zhou","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-1156-1108","affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou, China","institution_ids":["https://openalex.org/I38877650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5013933583"],"corresponding_institution_ids":["https://openalex.org/I198645480"],"apc_list":null,"apc_paid":null,"fwci":17.5716,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.9913058,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"12","issue":"4","first_page":"2458","last_page":"2472"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.95169997215271,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9087936282157898},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6317890882492065},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6248346567153931},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5122956037521362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4305497109889984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3529059886932373},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22001513838768005}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9087936282157898},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6317890882492065},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6248346567153931},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5122956037521362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4305497109889984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3529059886932373},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22001513838768005}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3548411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3548411","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4535489192","display_name":null,"funder_award_id":"82202270","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W2120685459","https://openalex.org/W2473930607","https://openalex.org/W2626309987","https://openalex.org/W2733765803","https://openalex.org/W2752291283","https://openalex.org/W2783741806","https://openalex.org/W2789264396","https://openalex.org/W2797742547","https://openalex.org/W2799758613","https://openalex.org/W2908736334","https://openalex.org/W2921708219","https://openalex.org/W2921858075","https://openalex.org/W2923817828","https://openalex.org/W2949570395","https://openalex.org/W2961130895","https://openalex.org/W2963748489","https://openalex.org/W2981856772","https://openalex.org/W2982426954","https://openalex.org/W2995789841","https://openalex.org/W3000245299","https://openalex.org/W3004999940","https://openalex.org/W3005097670","https://openalex.org/W3015447130","https://openalex.org/W3021951958","https://openalex.org/W3024476475","https://openalex.org/W3049287738","https://openalex.org/W3107875173","https://openalex.org/W3112343206","https://openalex.org/W3175402960","https://openalex.org/W3187417346","https://openalex.org/W3213644780","https://openalex.org/W4206116579","https://openalex.org/W4212808029","https://openalex.org/W4229003780","https://openalex.org/W4280523910","https://openalex.org/W4280610250","https://openalex.org/W4285167041","https://openalex.org/W4285214552","https://openalex.org/W4289529959","https://openalex.org/W4304762377","https://openalex.org/W4309635195","https://openalex.org/W4309947319","https://openalex.org/W4321609027","https://openalex.org/W4377691173","https://openalex.org/W4381801450","https://openalex.org/W4382518183","https://openalex.org/W4386408881","https://openalex.org/W4388188747","https://openalex.org/W4391697107","https://openalex.org/W4393336635","https://openalex.org/W4396505479","https://openalex.org/W4399851502","https://openalex.org/W4401023138","https://openalex.org/W4401251656","https://openalex.org/W4401326384","https://openalex.org/W4401880083","https://openalex.org/W6739320202"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W3159690896","https://openalex.org/W4230824443","https://openalex.org/W1989286518","https://openalex.org/W2945572725","https://openalex.org/W2921012173","https://openalex.org/W2758517546","https://openalex.org/W3134680667","https://openalex.org/W2804396347","https://openalex.org/W2185943007"],"abstract_inverted_index":{"Botnets":[0],"pose":[1],"a":[2,47,57,67,122,177],"significant":[3,205],"threat":[4,49],"to":[5,12,25,40,50,55,138,153,190,197,220],"Internet":[6],"of":[7,17,212],"Things":[8],"(IoT)":[9],"environments":[10],"due":[11],"the":[13,73,79,86,98,109,129,133,147,156,210],"limited":[14],"computational":[15,163],"resources":[16],"IoT":[18,63,91,179,222],"devices,":[19],"making":[20],"traditional":[21],"detection":[22,34,60,81,103,186,202,231],"methods":[23],"difficult":[24],"implement.":[26],"These":[27,204],"constraints":[28],"not":[29,207],"only":[30,208],"hinder":[31],"effective":[32],"real-time":[33,80,229],"but":[35,215],"also":[36,216],"leave":[37],"networks":[38],"vulnerable":[39],"large-scale":[41],"DDoS":[42],"and":[43,108,116,146,192,228],"botnet":[44,59,172,230],"attacks,":[45],"posing":[46],"critical":[48],"modern":[51],"connected":[52],"systems.":[53],"Aiming":[54],"design":[56],"lightweight":[58,102,171],"method":[61,184],"for":[62,105,170],"networks,":[64],"we":[65,120],"propose":[66,121],"novel":[68],"cloud\u2013edge\u2013node":[69],"framework":[70],"that":[71,93,182],"decouples":[72],"computationally":[74],"intensive":[75],"training":[76,115],"phase":[77],"from":[78],"phase.":[82],"In":[83],"our":[84,183,213],"framework,":[85],"node":[87],"layer":[88,100,111],"comprises":[89],"resource-constrained":[90],"devices":[92],"collect":[94],"raw":[95],"network":[96],"data,":[97],"edge":[99],"hosts":[101],"modules":[104],"rapid":[106],"analysis,":[107],"cloud":[110],"performs":[112],"heavy-duty":[113],"model":[114],"incremental":[117],"updates.":[118],"Additionally,":[119],"two-step":[123],"feature":[124,157],"selection":[125],"process,":[126],"in":[127,232],"which":[128],"first":[130],"step":[131,149],"uses":[132],"cumulative":[134],"density":[135],"function":[136],"(CDF)":[137],"rank":[139],"features":[140,169],"based":[141],"on":[142,176],"their":[143],"distribution":[144],"characteristics,":[145],"second":[148],"applies":[150],"Gini":[151],"importance":[152],"further":[154],"refine":[155],"set.":[158],"This":[159],"process":[160],"effectively":[161],"reduces":[162,185],"overhead":[164],"while":[165,199],"retaining":[166],"highly":[167],"discriminative":[168],"detection.":[173],"Experimental":[174],"results":[175],"public":[178],"dataset":[180],"reveal":[181],"time":[187],"by":[188,195,224],"up":[189,196],"52%":[191],"energy":[193],"consumption":[194],"71%":[198],"maintaining":[200],"high":[201],"accuracy.":[203],"improvements":[206],"validate":[209],"efficiency":[211],"approach":[214],"underline":[217],"its":[218],"potential":[219],"transform":[221],"security":[223],"enabling":[225],"scalable,":[226],"low-cost,":[227],"diverse":[233],"practical":[234],"scenarios.":[235]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":8}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
