{"id":"https://openalex.org/W3108033379","doi":"https://doi.org/10.1145/3429789.3429818","title":"Botnet Detection Using DNS and HTTP Traffic Analysis","display_name":"Botnet Detection Using DNS and HTTP Traffic Analysis","publication_year":2020,"publication_date":"2020-09-28","ids":{"openalex":"https://openalex.org/W3108033379","doi":"https://doi.org/10.1145/3429789.3429818","mag":"3108033379"},"language":"en","primary_location":{"id":"doi:10.1145/3429789.3429818","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3429789.3429818","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036348676","display_name":"Agung Udiyono","orcid":null},"institutions":[{"id":"https://openalex.org/I100406981","display_name":"Swiss German University","ror":"https://ror.org/047rtk203","country_code":"ID","type":"education","lineage":["https://openalex.org/I100406981"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Agung Udiyono","raw_affiliation_strings":["Swiss German University, Tangerang, Banten, Indonesia"],"affiliations":[{"raw_affiliation_string":"Swiss German University, Tangerang, Banten, Indonesia","institution_ids":["https://openalex.org/I100406981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101588651","display_name":"Charles Lim","orcid":null},"institutions":[{"id":"https://openalex.org/I100406981","display_name":"Swiss German University","ror":"https://ror.org/047rtk203","country_code":"ID","type":"education","lineage":["https://openalex.org/I100406981"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Charles Lim","raw_affiliation_strings":["Swiss German University, Tangerang, Banten, Indonesia"],"affiliations":[{"raw_affiliation_string":"Swiss German University, Tangerang, Banten, Indonesia","institution_ids":["https://openalex.org/I100406981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005599591","display_name":"Lukas Lukas","orcid":"https://orcid.org/0000-0001-6546-6555"},"institutions":[{"id":"https://openalex.org/I161010349","display_name":"Atma Jaya Catholic University of Indonesia","ror":"https://ror.org/02hd2zk59","country_code":"ID","type":"education","lineage":["https://openalex.org/I161010349"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Lukas","raw_affiliation_strings":["Cognitive Engineering Research Group (CERG), Universitas Katolik Atma Jaya, Jakarta, Indonesia"],"affiliations":[{"raw_affiliation_string":"Cognitive Engineering Research Group (CERG), Universitas Katolik Atma Jaya, Jakarta, Indonesia","institution_ids":["https://openalex.org/I161010349"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036348676"],"corresponding_institution_ids":["https://openalex.org/I100406981"],"apc_list":null,"apc_paid":null,"fwci":0.1542,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.54124006,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.984452486038208},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7382892966270447},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5353534817695618},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.4802458584308624},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.4709908366203308},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4350748658180237},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.41231244802474976},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2883710265159607},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24363982677459717}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.984452486038208},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7382892966270447},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5353534817695618},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.4802458584308624},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.4709908366203308},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4350748658180237},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.41231244802474976},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2883710265159607},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24363982677459717},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3429789.3429818","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3429789.3429818","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1516506771","https://openalex.org/W1827212170","https://openalex.org/W2046504126","https://openalex.org/W2054466620","https://openalex.org/W2082550445","https://openalex.org/W2101737524","https://openalex.org/W2337674987","https://openalex.org/W2410828832","https://openalex.org/W2763698768","https://openalex.org/W2890486498"],"related_works":["https://openalex.org/W2898126008","https://openalex.org/W86804927","https://openalex.org/W1583098994","https://openalex.org/W2386447999","https://openalex.org/W2130216882","https://openalex.org/W2091214382","https://openalex.org/W2376288852","https://openalex.org/W2100671106","https://openalex.org/W2364035342","https://openalex.org/W2061455058"],"abstract_inverted_index":{"To":[0],"perform":[1,48],"a":[2],"large":[3],"scale":[4],"attack":[5],"on":[6,129],"the":[7,22,25,37,45,78,97,130],"victim,":[8],"cyber":[9],"attacker":[10],"usually":[11],"prepares":[12],"thousands":[13],"if":[14],"not":[15,75],"millions":[16],"of":[17,101],"infected":[18,26],"computers":[19],"to":[20,43,47,53,95,106,119],"accomplish":[21],"goal.":[23],"Once":[24],"computers,":[27],"also":[28],"called":[29],"botnet,":[30],"are":[31],"ready,":[32],"they":[33],"will":[34],"communicate":[35],"with":[36,72],"Command":[38],"and":[39,88,91,103],"Control":[40],"(C&C)":[41],"server":[42],"obtain":[44],"instruction":[46],"their":[49,55,70,93],"acts.":[50],"Botnet":[51],"tries":[52],"disguise":[54],"communication":[56],"as":[57,66],"regular":[58],"traffic":[59,128],"by":[60,77],"using":[61,85],"commonly":[62],"used":[63,108],"protocols":[64,90,105],"such":[65],"HTTP":[67,87,102],"so":[68],"that":[69],"conversation":[71],"C&C":[73],"is":[74],"blocked":[76],"firewall.":[79],"This":[80],"research":[81],"explores":[82],"botnet's":[83],"footprints":[84],"both":[86],"DNS":[89,104],"analyzes":[92],"behaviors":[94],"select":[96],"most":[98],"appropriate":[99],"features":[100],"be":[107],"in":[109,123],"our":[110],"classification":[111],"model.":[112],"The":[113],"developed":[114],"model":[115],"has":[116],"been":[117],"shown":[118],"provide":[120],"86%":[121],"accuracy":[122],"distinguishing":[124],"botnet":[125],"from":[126],"benign":[127],"enterprise":[131],"network.":[132]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
