{"id":"https://openalex.org/W1892802630","doi":"https://doi.org/10.1155/2015/530250","title":"Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis","display_name":"Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W1892802630","doi":"https://doi.org/10.1155/2015/530250","mag":"1892802630"},"language":"en","primary_location":{"id":"doi:10.1155/2015/530250","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/530250","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1155/2015/530250","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100708872","display_name":"Tae\u2010Jin Lee","orcid":"https://orcid.org/0000-0002-3985-7808"},"institutions":[{"id":"https://openalex.org/I4210130362","display_name":"Korean Academy of Speech-Language Pathology and Audiology","ror":"https://ror.org/039dc8c42","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210130362"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Taejin Lee","raw_affiliation_strings":["KISA, IT Venture Tower 135, Jungdae-ro, Songpa-gu, Seoul 138-950, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"KISA, IT Venture Tower 135, Jungdae-ro, Songpa-gu, Seoul 138-950, Republic of Korea","institution_ids":["https://openalex.org/I4210130362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061379671","display_name":"Hesun Cho","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130362","display_name":"Korean Academy of Speech-Language Pathology and Audiology","ror":"https://ror.org/039dc8c42","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210130362"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hesun Cho","raw_affiliation_strings":["KISA, IT Venture Tower 135, Jungdae-ro, Songpa-gu, Seoul 138-950, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"KISA, IT Venture Tower 135, Jungdae-ro, Songpa-gu, Seoul 138-950, Republic of Korea","institution_ids":["https://openalex.org/I4210130362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048223275","display_name":"Haeryong Park","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130362","display_name":"Korean Academy of Speech-Language Pathology and Audiology","ror":"https://ror.org/039dc8c42","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210130362"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Haeryong Park","raw_affiliation_strings":["KISA, IT Venture Tower 135, Jungdae-ro, Songpa-gu, Seoul 138-950, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"KISA, IT Venture Tower 135, Jungdae-ro, Songpa-gu, Seoul 138-950, Republic of Korea","institution_ids":["https://openalex.org/I4210130362"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078627842","display_name":"Jin Kwak","orcid":"https://orcid.org/0000-0001-6931-2705"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jin Kwak","raw_affiliation_strings":["Division of Information and Computer Engineering, College of Information Technology, Ajou University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Division of Information and Computer Engineering, College of Information Technology, Ajou University, Republic of Korea","institution_ids":["https://openalex.org/I57664883"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100708872"],"corresponding_institution_ids":["https://openalex.org/I4210130362"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":0.6656,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73318742,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"11","issue":"9","first_page":"530250","last_page":"530250"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8464109301567078},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8260533809661865},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7886728048324585},{"id":"https://openalex.org/keywords/zombie","display_name":"Zombie","score":0.7174530625343323},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.6667646765708923},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5690518021583557},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5487951040267944},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5145063400268555},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48568353056907654},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4574664235115051},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16515055298805237},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14938810467720032},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11769959330558777}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8464109301567078},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8260533809661865},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7886728048324585},{"id":"https://openalex.org/C144446859","wikidata":"https://www.wikidata.org/wiki/Q219164","display_name":"Zombie","level":2,"score":0.7174530625343323},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.6667646765708923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5690518021583557},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5487951040267944},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5145063400268555},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48568353056907654},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4574664235115051},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16515055298805237},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14938810467720032},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11769959330558777},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2015/530250","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/530250","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:11:y:2015:i:9:p:530250","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1155/2015/530250","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:8f00e670133c4d1194c01851a66d499b","is_oa":true,"landing_page_url":"https://doaj.org/article/8f00e670133c4d1194c01851a66d499b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 11 (2015)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2015/530250","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/530250","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G1018999937","display_name":null,"funder_award_id":"2014R1A2A1A11050818","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G2174028987","display_name":null,"funder_award_id":"14-824-06-001","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W896503967","https://openalex.org/W1481472066","https://openalex.org/W1512743466","https://openalex.org/W1573760589","https://openalex.org/W1593657937","https://openalex.org/W1775772884","https://openalex.org/W1985132315","https://openalex.org/W2011211026","https://openalex.org/W2021365435","https://openalex.org/W2078216970","https://openalex.org/W2097034173","https://openalex.org/W2102262986","https://openalex.org/W2105272313","https://openalex.org/W2112063328","https://openalex.org/W2115018491","https://openalex.org/W2118555129","https://openalex.org/W2122182122","https://openalex.org/W2152592596","https://openalex.org/W2154874878","https://openalex.org/W2168248885","https://openalex.org/W2344279931","https://openalex.org/W2914797477","https://openalex.org/W2927249603","https://openalex.org/W4247108513"],"related_works":["https://openalex.org/W3211952845","https://openalex.org/W3187978971","https://openalex.org/W459167536","https://openalex.org/W4380874517","https://openalex.org/W4287028859","https://openalex.org/W4213192136","https://openalex.org/W2898750407","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964"],"abstract_inverted_index":{"Cyber":[0],"incidents":[1],"are":[2,26,67,181],"increasing":[3],"continuously.":[4],"More":[5,61],"than":[6,14,62],"200,000":[7],"new":[8],"malicious":[9,16,74,131],"codes":[10,17],"appear,":[11],"with":[12,73,128],"more":[13],"30,000":[15],"distributed":[18,146],"each":[19,176],"day":[20],"on":[21],"average.":[22],"These":[23],"cyber":[24,191],"attacks":[25],"expanding":[27],"gradually":[28],"to":[29,79,122,155,169],"the":[30,70,108,112,124,129,156,164,184,188],"social":[31],"infrastructure":[32],"(nuclear":[33],"energy,":[34],"power,":[35],"water,":[36],"etc.)":[37],"and":[38,54,88,119],"smart":[39],"sensor":[40,52],"networks.":[41],"This":[42,92],"paper":[43,93],"proposes":[44,94],"a":[45,95,103,148],"method":[46,105,135],"of":[47,64,190],"detecting":[48],"malware":[49],"propagation":[50],"in":[51,111,147],"Node":[53,71],"botnet":[55,125],"clustering":[56,104],"automatically":[57],"by":[58,69],"analyzing":[59],"e-mails.":[60],"80%":[63],"spam":[65,144],"e-mails":[66,145],"generated":[68],"infected":[72,127],"code,":[75],"using":[76],"various":[77],"methods":[78],"avoid":[80],"filtering":[81],"such":[82],"as":[83],"direct-to-MX,":[84],"fake":[85],"Received":[86],"header,":[87],"open":[89],"relay":[90],"vulnerability.":[91],"scheme":[96],"that":[97,106,159],"detects":[98],"those":[99],"types":[100],"accurately,":[101],"including":[102],"targets":[107],"URL":[109],"included":[110],"e-mail":[113,115],"body,":[114],"subject,":[116],"attached":[117],"file,":[118],"hosting":[120],"server,":[121],"detect":[123,170],"group":[126],"same":[130],"code.":[132],"The":[133],"proposed":[134,165],"recorded":[136],"about":[137],"85%":[138],"zombie":[139,174,186],"IP":[140],"detection":[141],"rate":[142],"when":[143],"commercial":[149],"environment":[150],"were":[151],"analyzed.":[152],"When":[153],"applied":[154],"portal":[157],"site":[158],"delivers":[160],"10":[161],"million":[162],"e-mails,":[163],"technology":[166],"is":[167],"expected":[168],"at":[171],"least":[172],"150,000":[173],"Nodes":[175],"day.":[177],"If":[178],"advanced":[179],"measures":[180],"taken":[182],"against":[183],"detected":[185],"Nodes,":[187],"spread":[189],"attack":[192],"damages":[193],"can":[194],"apparently":[195],"be":[196],"reduced.":[197]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
