{"id":"https://openalex.org/W4366380730","doi":"https://doi.org/10.1145/3584376.3584519","title":"An Abnormal Domain Name Generation Method Based on a Character-Level Model","display_name":"An Abnormal Domain Name Generation Method Based on a Character-Level Model","publication_year":2022,"publication_date":"2022-12-16","ids":{"openalex":"https://openalex.org/W4366380730","doi":"https://doi.org/10.1145/3584376.3584519"},"language":"en","primary_location":{"id":"doi:10.1145/3584376.3584519","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3584376.3584519","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021338180","display_name":"Chunbing Wu","orcid":"https://orcid.org/0000-0003-1581-3795"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chunbing Wu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027205215","display_name":"Jinlong Fei","orcid":"https://orcid.org/0000-0001-8499-9402"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jinlong Fei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021338180"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21661177,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"804","last_page":"810"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8137792348861694},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7263679504394531},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6768977642059326},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5685350894927979},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5485683679580688},{"id":"https://openalex.org/keywords/character","display_name":"Character (mathematics)","score":0.49601659178733826},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.39378130435943604},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3772520422935486},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3710979223251343},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24965441226959229},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10641023516654968}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8137792348861694},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7263679504394531},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6768977642059326},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5685350894927979},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5485683679580688},{"id":"https://openalex.org/C2780861071","wikidata":"https://www.wikidata.org/wiki/Q1062934","display_name":"Character (mathematics)","level":2,"score":0.49601659178733826},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.39378130435943604},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3772520422935486},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3710979223251343},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24965441226959229},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10641023516654968},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3584376.3584519","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3584376.3584519","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1981276685","https://openalex.org/W2344804892","https://openalex.org/W2752533296","https://openalex.org/W3111321853","https://openalex.org/W3191507008","https://openalex.org/W4220740553","https://openalex.org/W4235476616","https://openalex.org/W6600339457"],"related_works":["https://openalex.org/W1542980832","https://openalex.org/W2934080905","https://openalex.org/W2974446506","https://openalex.org/W2529207922","https://openalex.org/W3019762233","https://openalex.org/W3102772351","https://openalex.org/W4316087074","https://openalex.org/W4316128836","https://openalex.org/W3194258111","https://openalex.org/W2968586400"],"abstract_inverted_index":{"Internet":[0],"technology":[1,125],"develops":[2],"by":[3],"leaps":[4],"and":[5,32,91,101,147,159,189],"bounds,":[6],"new":[7,106,207],"types":[8],"of":[9,163,197,223],"botnet":[10,59],"attacks":[11,22],"are":[12,18,73,150],"springing":[13],"up.":[14],"Currently,":[15],"most":[16],"malware":[17,35],"stealthy":[19],"when":[20],"implementing":[21],"since":[23],"they":[24],"can":[25],"bypass":[26],"detection":[27,78,95,228],"strategies":[28],"such":[29],"as":[30,201],"blacklists":[31],"sinkholes.":[33],"These":[34],"mainly":[36],"use":[37],"DGA":[38,89,108,209],"to":[39,45,54,152,181,213,218],"generate":[40],"many":[41],"random":[42],"domain":[43,69,109,121,165,175,184,210,226],"names":[44],"prevent":[46],"C&C":[47],"server":[48],"IP":[49],"addresses":[50],"from":[51],"being":[52],"traced":[53],"the":[55,113,138,143,155,161,182,195,198,220,224],"source.":[56],"To":[57,111],"resist":[58],"attacks,":[60],"machine-learning":[61],"methods":[62,79,96],"have":[63,97],"been":[64],"proposed":[65],"for":[66,105,205],"detecting":[67],"abnormal":[68,120,164,174,225],"names.":[70,110,166],"However,":[71],"there":[72],"still":[74],"some":[75],"inadequacies,":[76],"e.g.,":[77],"based":[80,126],"on":[81,127],"manual":[82],"feature":[83],"extraction":[84],"couldn't":[85],"identify":[86],"novel":[87],"variant":[88,107,208],"domains,":[90],"existing":[92],"neural":[93],"network":[94,145],"weak":[98],"generalization":[99,221],"ability":[100,222],"lack":[102],"training":[103,202],"data":[104,123,177,200,203],"address":[112],"above":[114],"problems,":[115],"this":[116,172],"paper":[117],"proposes":[118],"an":[119],"name":[122,176,185,227],"generation":[124,162],"a":[128,206,214],"character-level":[129,139],"model.":[130,141,229],"Firstly,":[131],"combining":[132],"specific":[133],"text":[134],"generation-related":[135],"ideas":[136],"improves":[137],"language":[140],"Secondly,":[142],"Bi-GRU":[144],"model":[146],"attention":[148],"mechanism":[149],"used":[151],"thoroughly":[153],"learn":[154],"internal":[156],"correlation":[157],"features,":[158],"simulate":[160],"The":[167],"experimental":[168],"results":[169],"show":[170],"that":[171],"method's":[173],"is":[178],"highly":[179],"similar":[180],"actual":[183],"in":[186],"relative":[187],"entropy":[188],"character":[190],"composition.":[191],"Furthermore,":[192],"it":[193],"verifies":[194],"feasibility":[196],"generated":[199],"set":[204],"name,":[211],"which":[212],"certain":[215],"extent,":[216],"helps":[217],"improve":[219]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
