{"id":"https://openalex.org/W3023511949","doi":"https://doi.org/10.1109/itnac46935.2019.9077964","title":"Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning","display_name":"Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3023511949","doi":"https://doi.org/10.1109/itnac46935.2019.9077964","mag":"3023511949"},"language":"en","primary_location":{"id":"doi:10.1109/itnac46935.2019.9077964","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac46935.2019.9077964","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084113245","display_name":"Xue Jun Li","orcid":"https://orcid.org/0000-0003-2241-0767"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Xue Jun Li","raw_affiliation_strings":["Auckland University of Technology,Department of EEE,New Zealand","Department of EEE, Auckland University of Technology, New Zealand"],"affiliations":[{"raw_affiliation_string":"Auckland University of Technology,Department of EEE,New Zealand","institution_ids":["https://openalex.org/I39854758"]},{"raw_affiliation_string":"Department of EEE, Auckland University of Technology, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["School of EEE, Nanyang Technological University,Singapore","School of EEE, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of EEE, Nanyang Technological University,Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of EEE, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085358694","display_name":"Yi Lin Yen","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yi Lin Yen","raw_affiliation_strings":["School of EEE, Nanyang Technological University,Singapore","School of EEE, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of EEE, Nanyang Technological University,Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of EEE, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084113245"],"corresponding_institution_ids":["https://openalex.org/I39854758"],"apc_list":null,"apc_paid":null,"fwci":0.1768,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58507031,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9697496891021729},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7560750246047974},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.6852817535400391},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6602399945259094},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.5301151275634766},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48546722531318665},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47827255725860596},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.44796422123908997},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.43470197916030884},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.2419445812702179},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16062158346176147}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9697496891021729},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7560750246047974},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.6852817535400391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6602399945259094},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.5301151275634766},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48546722531318665},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47827255725860596},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.44796422123908997},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.43470197916030884},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.2419445812702179},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16062158346176147},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac46935.2019.9077964","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac46935.2019.9077964","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1499963479","https://openalex.org/W1583098994","https://openalex.org/W1973980104","https://openalex.org/W2026621111","https://openalex.org/W2114996745","https://openalex.org/W2148323889","https://openalex.org/W2542582667","https://openalex.org/W2789828921","https://openalex.org/W2790664081","https://openalex.org/W3105682467","https://openalex.org/W6634779276"],"related_works":["https://openalex.org/W2225089553","https://openalex.org/W3129800954","https://openalex.org/W2398634398","https://openalex.org/W2082456656","https://openalex.org/W2026621111","https://openalex.org/W4399181772","https://openalex.org/W4293901154","https://openalex.org/W4286718853","https://openalex.org/W4211147623","https://openalex.org/W4296473472"],"abstract_inverted_index":{"Cybersecurity":[0],"becomes":[1],"increasingly":[2],"important":[3,34],"as":[4],"information":[5],"and":[6,21,39],"communications":[7],"technology":[8],"(ICT)":[9],"is":[10,33],"adopted":[11],"throughout":[12],"the":[13,61,99],"world.":[14],"Cyber":[15],"attacks":[16,27,38],"can":[17,103],"happen":[18],"both":[19],"externally":[20],"internally.":[22],"With":[23,91],"majority":[24],"of":[25,63,73,84,109,117],"cyber":[26],"being":[28],"executed":[29],"by":[30],"insiders,":[31],"it":[32],"to":[35,47,55],"detect":[36,56],"insider":[37,57],"even":[40],"prevent":[41],"them.":[42],"This":[43],"paper":[44],"studies":[45],"how":[46],"apply":[48],"machine":[49],"learning":[50],"in":[51,60],"analyzing":[52],"network":[53],"traffic":[54],"attacks,":[58],"particularly":[59],"area":[62],"botnet":[64],"detection.":[65],"Different":[66],"from":[67],"existing":[68],"work":[69],"considered":[70],"two":[71,82],"types":[72,83],"Hyper":[74],"Text":[75],"Transfer":[76],"Protocol":[77],"(HTTP)-based":[78],"botnets,":[79],"we":[80],"consider":[81],"popular":[85],"Internet":[86],"Relay":[87],"Chat":[88],"(IRC)-based":[89],"botnets.":[90],"selected":[92],"flow":[93],"characteristics,":[94],"experimental":[95],"results":[96],"show":[97],"that":[98],"proposed":[100],"detection":[101],"model":[102],"achieve":[104],"a":[105,113],"true":[106],"positive":[107,115],"rate":[108,116],"over":[110],"96%,":[111],"with":[112],"false":[114],"less":[118],"than":[119],"5%.":[120]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
