{"id":"https://openalex.org/W2773270814","doi":"https://doi.org/10.1145/3155133.3155166","title":"DGA Botnet Detection Using Supervised Learning Methods","display_name":"DGA Botnet Detection Using Supervised Learning Methods","publication_year":2017,"publication_date":"2017-12-07","ids":{"openalex":"https://openalex.org/W2773270814","doi":"https://doi.org/10.1145/3155133.3155166","mag":"2773270814"},"language":"en","primary_location":{"id":"doi:10.1145/3155133.3155166","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3155133.3155166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth International Symposium on Information and Communication Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052620160","display_name":"Hieu Mac","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hieu Mac","raw_affiliation_strings":["Bach Khoa Cybersecurity Centre, HUST, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Bach Khoa Cybersecurity Centre, HUST, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026992540","display_name":"Duc Tran","orcid":"https://orcid.org/0000-0001-7251-3516"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Duc Tran","raw_affiliation_strings":["Bach Khoa Cybersecurity Centre, HUST, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Bach Khoa Cybersecurity Centre, HUST, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001284800","display_name":"Van Tong","orcid":"https://orcid.org/0000-0003-2050-994X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Van Tong","raw_affiliation_strings":["Bach Khoa Cybersecurity Centre, HUST, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Bach Khoa Cybersecurity Centre, HUST, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104125276","display_name":"Linh Giang Nguyen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Linh Giang Nguyen","raw_affiliation_strings":["Bach Khoa Cybersecurity Centre, HUST, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Bach Khoa Cybersecurity Centre, HUST, Vietnam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053163348","display_name":"Hai Anh Tran","orcid":"https://orcid.org/0000-0002-6215-4879"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hai Anh Tran","raw_affiliation_strings":["Bach Khoa Cybersecurity Centre, HUST, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Bach Khoa Cybersecurity Centre, HUST, Vietnam","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5052620160"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.4883,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.96335579,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"211","last_page":"218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12676","display_name":"Machine Learning and ELM","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8948650360107422},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.829944372177124},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7150145173072815},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6970459222793579},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6054172515869141},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5185068845748901},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5169283747673035},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.504804253578186},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5031449198722839},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.4735267162322998},{"id":"https://openalex.org/keywords/blacklisting","display_name":"Blacklisting","score":0.47337502241134644},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.44620153307914734},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.4330177307128906},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23020833730697632},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.22161412239074707},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19691365957260132},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08667010068893433}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8948650360107422},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.829944372177124},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7150145173072815},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6970459222793579},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6054172515869141},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5185068845748901},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5169283747673035},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.504804253578186},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5031449198722839},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.4735267162322998},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.47337502241134644},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.44620153307914734},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.4330177307128906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23020833730697632},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.22161412239074707},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19691365957260132},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08667010068893433},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3155133.3155166","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3155133.3155166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth International Symposium on Information and Communication Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W17316494","https://openalex.org/W155384935","https://openalex.org/W1508856789","https://openalex.org/W1561983441","https://openalex.org/W1563088657","https://openalex.org/W1565746575","https://openalex.org/W1873332500","https://openalex.org/W1938755728","https://openalex.org/W1981294881","https://openalex.org/W2015917933","https://openalex.org/W2064675550","https://openalex.org/W2079735306","https://openalex.org/W2082550445","https://openalex.org/W2096352448","https://openalex.org/W2111072639","https://openalex.org/W2125055259","https://openalex.org/W2136848157","https://openalex.org/W2182722412","https://openalex.org/W2397933063","https://openalex.org/W2541577949","https://openalex.org/W2565766771","https://openalex.org/W2587019100","https://openalex.org/W2591127855","https://openalex.org/W2591856843","https://openalex.org/W2606429533","https://openalex.org/W2750680860","https://openalex.org/W2951559648"],"related_works":["https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W2005813008","https://openalex.org/W2017968904","https://openalex.org/W2514488323","https://openalex.org/W4386384589","https://openalex.org/W4312347107","https://openalex.org/W1586252162","https://openalex.org/W4321609369","https://openalex.org/W2140607115"],"abstract_inverted_index":{"Modern":[0],"botnets":[1],"are":[2],"based":[3],"on":[4,65,142],"Domain":[5],"Generation":[6],"Algorithms":[7],"(DGAs)":[8],"to":[9,26,63,72,133],"build":[10],"a":[11,130,157],"resilient":[12],"communication":[13],"between":[14],"bots":[15],"and":[16,18,29,69,115,154],"Command":[17],"Control":[19],"(C&C)":[20],"server.":[21],"The":[22],"basic":[23],"aim":[24],"is":[25,61,70],"avoid":[27],"blacklisting":[28],"evade":[30],"the":[31,37,48,66,90,93,137,143],"Intrusion":[32],"Protection":[33],"Systems":[34],"(IPS).":[35],"Given":[36],"prevalence":[38],"of":[39,92],"this":[40,165],"mechanism,":[41],"numerous":[42],"solutions":[43],"have":[44,88,119],"been":[45,121],"developed":[46],"in":[47,95,124,164],"literature.":[49],"In":[50],"particular,":[51],"supervised":[52,104],"learning":[53,105],"has":[54],"received":[55],"an":[56],"increased":[57],"interest":[58],"as":[59],"it":[60],"able":[62],"operate":[64],"raw":[67],"domains":[68],"amenable":[71],"real-time":[73],"applications.":[74],"Hidden":[75],"Markov":[76],"Model,":[77],"C4.5":[78],"decision":[79],"tree,":[80],"Extreme":[81],"Learning":[82],"Machine,":[83],"Long":[84],"Short-Term":[85],"Memory":[86],"networks":[87],"become":[89],"state":[91],"art":[94],"DGA":[96,146],"botnet":[97],"detection.":[98],"There":[99],"also":[100],"exist":[101],"several":[102],"advanced":[103],"methods,":[106,139],"namely":[107],"Support":[108],"Vector":[109],"Machine":[110],"(SVM),":[111],"Recurrent":[112],"SVM,":[113],"CNN+LSTM":[114],"Bidirectional":[116],"LSTM,":[117],"which":[118],"not":[120],"suitably":[122],"appropriated":[123],"such":[125],"domain.":[126],"This":[127],"paper":[128],"presents":[129],"first":[131],"attempt":[132],"thoroughly":[134],"investigate":[135],"all":[136],"above":[138],"evaluate":[140],"them":[141],"real-world":[144],"collected":[145],"dataset":[147],"involving":[148],"38":[149],"classes":[150],"with":[151],"168,900":[152],"samples,":[153],"should":[155],"provide":[156],"valuable":[158],"reference":[159],"point":[160],"for":[161],"future":[162],"research":[163],"field.":[166]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":3}],"updated_date":"2026-05-12T08:28:47.272897","created_date":"2025-10-10T00:00:00"}
