{"id":"https://openalex.org/W2913504480","doi":"https://doi.org/10.1155/2019/4612474","title":"Malicious Domain Names Detection Algorithm Based on <i>N</i>-Gram","display_name":"Malicious Domain Names Detection Algorithm Based on <i>N</i>-Gram","publication_year":2019,"publication_date":"2019-02-03","ids":{"openalex":"https://openalex.org/W2913504480","doi":"https://doi.org/10.1155/2019/4612474","mag":"2913504480"},"language":"en","primary_location":{"id":"doi:10.1155/2019/4612474","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4612474","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2019/4612474.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/jcnc/2019/4612474.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103242236","display_name":"Hong Zhao","orcid":"https://orcid.org/0000-0002-5515-6139"},"institutions":[{"id":"https://openalex.org/I22716506","display_name":"Lanzhou University of Technology","ror":"https://ror.org/03panb555","country_code":"CN","type":"education","lineage":["https://openalex.org/I22716506"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hong Zhao","raw_affiliation_strings":["School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China","institution_ids":["https://openalex.org/I22716506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000231514","display_name":"Zhaobin Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I22716506","display_name":"Lanzhou University of Technology","ror":"https://ror.org/03panb555","country_code":"CN","type":"education","lineage":["https://openalex.org/I22716506"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaobin Chang","raw_affiliation_strings":["School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China","institution_ids":["https://openalex.org/I22716506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101699654","display_name":"Guangbin Bao","orcid":"https://orcid.org/0000-0001-8850-0891"},"institutions":[{"id":"https://openalex.org/I22716506","display_name":"Lanzhou University of Technology","ror":"https://ror.org/03panb555","country_code":"CN","type":"education","lineage":["https://openalex.org/I22716506"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangbin Bao","raw_affiliation_strings":["School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China","institution_ids":["https://openalex.org/I22716506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101870858","display_name":"Xiangyan Zeng","orcid":"https://orcid.org/0000-0002-9023-338X"},"institutions":[{"id":"https://openalex.org/I77250616","display_name":"Fort Valley State University","ror":"https://ror.org/05mpwj415","country_code":"US","type":"education","lineage":["https://openalex.org/I77250616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiangyan Zeng","raw_affiliation_strings":["Department of Mathematics and Computer Science, Fort Valley State University, Fort Valley, GA 31030, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Fort Valley State University, Fort Valley, GA 31030, USA","institution_ids":["https://openalex.org/I77250616"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103242236"],"corresponding_institution_ids":["https://openalex.org/I22716506"],"apc_list":{"value":1400,"currency":"USD","value_usd":1400},"apc_paid":{"value":1400,"currency":"USD","value_usd":1400},"fwci":2.7859,"has_fulltext":true,"cited_by_count":36,"citation_normalized_percentile":{"value":0.91010756,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/substring","display_name":"Substring","score":0.9340295791625977},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7115250825881958},{"id":"https://openalex.org/keywords/n-gram","display_name":"n-gram","score":0.6864151954650879},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6282885074615479},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5219396948814392},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.48461398482322693},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.46708035469055176},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.45275282859802246},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2502107620239258},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22345134615898132},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21819430589675903}],"concepts":[{"id":"https://openalex.org/C182407805","wikidata":"https://www.wikidata.org/wiki/Q2626534","display_name":"Substring","level":3,"score":0.9340295791625977},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7115250825881958},{"id":"https://openalex.org/C117884012","wikidata":"https://www.wikidata.org/wiki/Q94489","display_name":"n-gram","level":3,"score":0.6864151954650879},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6282885074615479},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5219396948814392},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.48461398482322693},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.46708035469055176},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.45275282859802246},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2502107620239258},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22345134615898132},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21819430589675903},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1155/2019/4612474","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4612474","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2019/4612474.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},{"id":"pmh:oai:ir.lzu.edu.cn/:262010/285966","is_oa":false,"landing_page_url":"http://ir.lzu.edu.cn/handle/262010/285966","pdf_url":null,"source":{"id":"https://openalex.org/S4406923049","display_name":"Lanzhou University Institutional Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:doaj.org/article:790986f25afe41ab895bef4ff71e9cd5","is_oa":true,"landing_page_url":"https://doaj.org/article/790986f25afe41ab895bef4ff71e9cd5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Networks and Communications, Vol 2019 (2019)","raw_type":"article"},{"id":"pmh:oai:ir.lzu.edu.cn/:262010/295156","is_oa":false,"landing_page_url":"http://ir.lzu.edu.cn/handle/262010/295156","pdf_url":null,"source":{"id":"https://openalex.org/S4406923049","display_name":"Lanzhou University Institutional Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1155/2019/4612474","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4612474","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2019/4612474.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1519174469","display_name":null,"funder_award_id":"NGII20160311","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1574323910","display_name":null,"funder_award_id":"2016011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2558086092","display_name":null,"funder_award_id":"51668043","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3388314091","display_name":null,"funder_award_id":"NGII20160112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4148739412","display_name":null,"funder_award_id":"201603","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5525282449","display_name":null,"funder_award_id":"201601","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5733390078","display_name":null,"funder_award_id":"Grant nos.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7274746919","display_name":null,"funder_award_id":"2016031","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8176047477","display_name":null,"funder_award_id":"18JR3RA156","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8208342437","display_name":null,"funder_award_id":"1 and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8633397699","display_name":null,"funder_award_id":"61262016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2913504480.pdf","grobid_xml":"https://content.openalex.org/works/W2913504480.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1967630610","https://openalex.org/W1981294881","https://openalex.org/W2008066750","https://openalex.org/W2009779276","https://openalex.org/W2082550445","https://openalex.org/W2239778906","https://openalex.org/W2394622992","https://openalex.org/W2582369139","https://openalex.org/W2728121559","https://openalex.org/W2883550956"],"related_works":["https://openalex.org/W1583922594","https://openalex.org/W1542422837","https://openalex.org/W1974038726","https://openalex.org/W2141389247","https://openalex.org/W2184716188","https://openalex.org/W2388600609","https://openalex.org/W2141732239","https://openalex.org/W2913504480","https://openalex.org/W4283736679","https://openalex.org/W1546751907"],"abstract_inverted_index":{"Malicious":[0],"domain":[1,17,30,43,48,56,74,102,132,148,182],"name":[2,44,103,133],"attacks":[3],"have":[4],"become":[5],"a":[6,15,83,98,160,167],"serious":[7],"issue":[8],"for":[9],"Internet":[10],"security.":[11],"In":[12,140],"this":[13],"study,":[14],"malicious":[16,99,135,181],"names":[18,31,75,183],"detection":[19,152,184],"algorithm":[20,153],"based":[21,118],"on":[22,119,143],"N":[23,39,109],"-Gram":[24,40,110],"is":[25,49,76,85,104,116,134,136,176],"proposed.":[26],"The":[27,68,173],"top":[28],"100,000":[29,73],"in":[32,37,92],"Alexa":[33,144],"2013":[34],"are":[35],"used":[36],"the":[38,46,59,72,79,93,101,108,120,127,131,141,150],"method.":[41],"Each":[42],"excluding":[45],"top-level":[47],"segmented":[50,106],"into":[51],"substrings":[52],"according":[53,87],"to":[54,88],"its":[55,89,113,124],"level":[57],"with":[58],"lengths":[60],"of":[61,71,82,123,129,158,164,171],"3,":[62],"4,":[63],"5,":[64],"6,":[65],"and":[66,78,112,146,166],"7.":[67],"substring":[69,84,94],"set":[70],"established,":[77],"weight":[80,121],"value":[81,115],"calculated":[86,117],"occurrence":[90],"number":[91],"set.":[95],"To":[96],"detect":[97],"attack,":[100],"also":[105],"by":[107,138],"method":[111],"reputation":[114],"values":[122],"substrings.":[125],"Finally,":[126],"judgment":[128],"whether":[130],"made":[137],"thresholding.":[139],"experiments":[142],"2017":[145],"Malware":[147],"list,":[149],"proposed":[151],"yielded":[154],"an":[155],"accuracy":[156],"rate":[157,163,170],"94.04%,":[159],"false":[161,168],"negative":[162],"7.42%,":[165],"positive":[169],"6.14%.":[172],"time":[174],"complexity":[175],"lower":[177],"than":[178],"other":[179],"popular":[180],"algorithms.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":6},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
