{"id":"https://openalex.org/W2983248864","doi":"https://doi.org/10.1155/2019/2182615","title":"Using XGBoost to Discover Infected Hosts Based on HTTP Traffic","display_name":"Using XGBoost to Discover Infected Hosts Based on HTTP Traffic","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2983248864","doi":"https://doi.org/10.1155/2019/2182615","mag":"2983248864"},"language":"en","primary_location":{"id":"doi:10.1155/2019/2182615","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/2182615","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2182615.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/2182615.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029715489","display_name":"Weina Niu","orcid":"https://orcid.org/0000-0002-3235-3463"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weina Niu","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100416826","display_name":"Ting Li","orcid":"https://orcid.org/0000-0001-5145-3024"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Li","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, Guangdong 518040, China","School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, Guangdong 518040, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042835723","display_name":"Teng Hu","orcid":"https://orcid.org/0000-0002-8624-0210"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I2801345734","display_name":"China Academy of Engineering Physics","ror":"https://ror.org/039vqpp67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I2801345734"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Teng Hu","raw_affiliation_strings":["Institute of Computer Application, China Academy of Engineering Physics, Mianyang, Sichuan 621900, China","School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Application, China Academy of Engineering Physics, Mianyang, Sichuan 621900, China","institution_ids":["https://openalex.org/I2801345734"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101803941","display_name":"Tianyu Jiang","orcid":"https://orcid.org/0009-0002-7418-1193"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyu Jiang","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100341990","display_name":"Wu H","orcid":"https://orcid.org/0009-0008-8295-0400"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Wu","raw_affiliation_strings":["Glasgow College, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China"],"affiliations":[{"raw_affiliation_string":"Glasgow College, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042835723"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I2801345734"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.7429,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.75380898,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9061806201934814},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8350472450256348},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.7059727311134338},{"id":"https://openalex.org/keywords/hypertext-transfer-protocol","display_name":"Hypertext Transfer Protocol","score":0.506925642490387},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.4643794298171997},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43584969639778137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3808475732803345},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34418314695358276},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.294156551361084},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18346497416496277},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14421355724334717}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9061806201934814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8350472450256348},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.7059727311134338},{"id":"https://openalex.org/C149672775","wikidata":"https://www.wikidata.org/wiki/Q8777","display_name":"Hypertext Transfer Protocol","level":3,"score":0.506925642490387},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.4643794298171997},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43584969639778137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3808475732803345},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34418314695358276},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.294156551361084},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18346497416496277},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14421355724334717},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2019/2182615","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/2182615","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2182615.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d3e61984587e431e82342e30248f1fd9","is_oa":true,"landing_page_url":"https://doaj.org/article/d3e61984587e431e82342e30248f1fd9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/2182615","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/2182615","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2182615.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2206035631","display_name":null,"funder_award_id":"6190226","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3154722078","display_name":null,"funder_award_id":"2016QY04W0800","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6248607417","display_name":null,"funder_award_id":"61572115","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G66755767","display_name":null,"funder_award_id":"JG2019055","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7820223330","display_name":null,"funder_award_id":"6157211","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G935485695","display_name":null,"funder_award_id":"61902262","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2983248864.pdf","grobid_xml":"https://content.openalex.org/works/W2983248864.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W1931952763","https://openalex.org/W1936523258","https://openalex.org/W2026621111","https://openalex.org/W2095705004","https://openalex.org/W2101234009","https://openalex.org/W2297788108","https://openalex.org/W2324464293","https://openalex.org/W2558619741","https://openalex.org/W2559974467","https://openalex.org/W2768211408","https://openalex.org/W2784097977","https://openalex.org/W2794826941","https://openalex.org/W2892556724","https://openalex.org/W2908789442","https://openalex.org/W2913857451"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2125652721","https://openalex.org/W1540371141","https://openalex.org/W1549363203","https://openalex.org/W2753240997","https://openalex.org/W2147697413","https://openalex.org/W2154063878","https://openalex.org/W4231274751","https://openalex.org/W2556012038","https://openalex.org/W1764168690"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,60,69,76,86,95,106,190,201,207],"number":[4],"of":[5],"malware":[6,30,51,176],"and":[7,20,71,130,148,157,180,200,206],"infected":[8,45,61,101,122],"hosts":[9,42,123],"has":[10,32],"increased":[11],"exponentially,":[12],"which":[13,79,174],"causes":[14],"great":[15],"losses":[16],"to":[17,27,68,90,120,126,141,152,165],"governments,":[18],"enterprises,":[19],"individuals.":[21],"However,":[22],"traditional":[23],"technologies":[24],"are":[25],"difficult":[26],"timely":[28],"detect":[29,41,121],"that":[31,167,189],"been":[33],"deformed,":[34],"confused,":[35],"or":[36],"modified":[37],"since":[38],"they":[39],"usually":[40,63],"before":[43],"being":[44],"by":[46,102],"malware.":[47,103],"Host":[48],"detection":[49,128,191,202],"during":[50],"infection":[52],"can":[53],"make":[54],"up":[55],"for":[56,145],"their":[57],"deficiency.":[58],"Moreover,":[59],"host":[62,87,96,100],"sends":[64],"a":[65,99,136,162],"connection":[66],"request":[67],"command":[70],"control":[72],"(C&amp;C)":[73],"server":[74],"using":[75,172],"HTTP":[77,111,146,196],"protocol,":[78],"generates":[80],"malicious":[81,92,155],"external":[82,93],"traffic.":[83,159],"Thus,":[84],"if":[85],"is":[88,170,193,211],"found":[89],"have":[91],"traffic,":[94],"may":[97],"be":[98],"Based":[104],"on":[105],"background,":[107],"this":[108],"paper":[109],"uses":[110,135,149],"traffic":[112,156,177,182,197],"combined":[113],"with":[114],"eXtreme":[115],"Gradient":[116],"Boosting":[117],"(XGBoost)":[118],"algorithm":[119,140,151],"in":[124],"order":[125],"improve":[127],"efficiency":[129],"accuracy.":[131],"The":[132],"proposed":[133],"approach":[134,169],"template":[137],"automatic":[138],"generation":[139],"generate":[142],"feature":[143],"templates":[144],"headers":[147],"XGBoost":[150],"distinguish":[153],"between":[154],"normal":[158,181],"We":[160],"conduct":[161],"performance":[163],"analysis":[164],"demonstrate":[166],"our":[168],"efficient":[171],"dataset,":[173],"includes":[175],"from":[178,183],"MALWARE-TRAFFIC-ANALYSIS.NET":[179],"UNSW-NB":[184],"15.":[185],"Experimental":[186],"results":[187],"show":[188],"speed":[192],"about":[194],"1859":[195],"per":[198],"second,":[199],"accuracy":[203],"reaches":[204],"98.72%,":[205],"false":[208],"positive":[209],"rate":[210],"less":[212],"than":[213],"1%.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
