{"id":"https://openalex.org/W3095756455","doi":"https://doi.org/10.1155/2020/8841544","title":"MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection","display_name":"MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection","publication_year":2020,"publication_date":"2020-10-29","ids":{"openalex":"https://openalex.org/W3095756455","doi":"https://doi.org/10.1155/2020/8841544","mag":"3095756455"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8841544","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8841544","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8841544.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8841544.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041406463","display_name":"Tzung-Han Jeng","orcid":"https://orcid.org/0000-0002-8212-5151"},"institutions":[{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]},{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Tzung-Han Jeng","raw_affiliation_strings":["Chunghwa Telecommunication Laboratories, Taoyuan, Taiwan","National Central University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Chunghwa Telecommunication Laboratories, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I92172085"]},{"raw_affiliation_string":"National Central University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I22265921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101648249","display_name":"Yi\u2010Ming Chen","orcid":"https://orcid.org/0000-0003-2981-6700"},"institutions":[{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yi-Ming Chen","raw_affiliation_strings":["National Central University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Central University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I22265921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101573092","display_name":"Chien-Chih Chen","orcid":"https://orcid.org/0000-0002-0019-1164"},"institutions":[{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chien-Chih Chen","raw_affiliation_strings":["Chunghwa Telecommunication Laboratories, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Chunghwa Telecommunication Laboratories, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I92172085"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027237520","display_name":"Chuan-Chiang Huang","orcid":"https://orcid.org/0000-0003-1429-3679"},"institutions":[{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chuan-Chiang Huang","raw_affiliation_strings":["Chunghwa Telecommunication Laboratories, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Chunghwa Telecommunication Laboratories, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I92172085"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041406463"],"corresponding_institution_ids":["https://openalex.org/I22265921","https://openalex.org/I92172085"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.5338,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75712258,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8808354139328003},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7534140348434448},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6030135154724121},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5927513241767883},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5861561894416809},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5216037034988403},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.5003106594085693},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.4798926115036011},{"id":"https://openalex.org/keywords/bipartite-graph","display_name":"Bipartite graph","score":0.47216957807540894},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4574728012084961},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4560454189777374},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3546626567840576},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2600589692592621},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.2452111840248108},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.1870517134666443},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14832574129104614},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10700711607933044}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8808354139328003},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7534140348434448},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6030135154724121},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5927513241767883},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5861561894416809},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5216037034988403},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.5003106594085693},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.4798926115036011},{"id":"https://openalex.org/C197657726","wikidata":"https://www.wikidata.org/wiki/Q174733","display_name":"Bipartite graph","level":3,"score":0.47216957807540894},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4574728012084961},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4560454189777374},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3546626567840576},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2600589692592621},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.2452111840248108},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.1870517134666443},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14832574129104614},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10700711607933044},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8841544","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8841544","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8841544.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cc8155b5b0cc44ddb6f68f4e49c4868f","is_oa":true,"landing_page_url":"https://doaj.org/article/cc8155b5b0cc44ddb6f68f4e49c4868f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8841544","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8841544","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8841544.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.699999988079071,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3095756455.pdf","grobid_xml":"https://content.openalex.org/works/W3095756455.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W12316596","https://openalex.org/W79790601","https://openalex.org/W97539848","https://openalex.org/W109909280","https://openalex.org/W113187444","https://openalex.org/W155384935","https://openalex.org/W172410088","https://openalex.org/W1481472066","https://openalex.org/W1498756827","https://openalex.org/W1499648394","https://openalex.org/W1559377889","https://openalex.org/W1775772884","https://openalex.org/W1827212170","https://openalex.org/W1916198581","https://openalex.org/W1954903228","https://openalex.org/W1977415353","https://openalex.org/W1980793860","https://openalex.org/W1982782621","https://openalex.org/W2012543144","https://openalex.org/W2039858940","https://openalex.org/W2040750298","https://openalex.org/W2053774863","https://openalex.org/W2061455058","https://openalex.org/W2069620139","https://openalex.org/W2146729596","https://openalex.org/W2162808666","https://openalex.org/W2182073189","https://openalex.org/W2184678913","https://openalex.org/W2251974650","https://openalex.org/W2277564881","https://openalex.org/W2545374358","https://openalex.org/W2580641941","https://openalex.org/W2625110438","https://openalex.org/W2784749601","https://openalex.org/W2787894218","https://openalex.org/W3162613717","https://openalex.org/W4233802931","https://openalex.org/W4402522195","https://openalex.org/W6603957951","https://openalex.org/W6606342502","https://openalex.org/W6628600657","https://openalex.org/W6637848932","https://openalex.org/W6685616623"],"related_works":["https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W1599449514","https://openalex.org/W4249009605","https://openalex.org/W2900526031","https://openalex.org/W4256304280","https://openalex.org/W2395100307","https://openalex.org/W3183826413","https://openalex.org/W2909615516"],"abstract_inverted_index":{"Despite":[0],"the":[1,16,28,110,132,157,168],"efforts":[2],"of":[3,67,92,112,134,180],"information":[4],"security":[5],"experts,":[6],"cybercrimes":[7,135],"are":[8,23,103,114],"still":[9],"emerging":[10],"at":[11,56],"an":[12,38],"alarming":[13],"rate.":[14],"Among":[15],"tools":[17],"used":[18],"by":[19,207],"cybercriminals,":[20],"malicious":[21,96,101,140,200],"domains":[22,36,201],"indispensable":[24],"and":[25,43,50,74,84,107,136,153,197,217],"harm":[26],"from":[27,41],"Internet":[29],"has":[30,190,220],"become":[31],"a":[32,64,89,99,128,145],"global":[33],"problem.":[34],"Malicious":[35],"play":[37],"important":[39],"role":[40],"SPAM":[42],"Cross-Site":[44],"Scripting":[45],"(XSS)":[46],"threats":[47],"to":[48,70,87,105],"Botnet":[49],"Advanced":[51],"Persistent":[52],"Threat":[53],"(APT)":[54],"attacks":[55],"large":[57,90],"scales.":[58],"To":[59,130,149],"ensure":[60],"there":[61],"is":[62,127],"not":[63,204],"single":[65],"point":[66],"failure":[68],"or":[69],"prevent":[71],"their":[72],"detection":[73],"blocking,":[75],"malware":[76],"authors":[77],"have":[78],"employed":[79],"domain":[80,93],"generation":[81],"algorithms":[82],"(DGAs)":[83],"domain-flux":[85],"techniques":[86],"generate":[88],"number":[91],"names":[94],"for":[95],"servers.":[97],"As":[98],"result,":[100],"servers":[102],"difficult":[104],"detect":[106,138],"remove.":[108],"Furthermore,":[109],"clues":[111],"cybercrime":[113],"stored":[115],"in":[116,167],"network":[117,124,227],"traffic":[118,125],"logs,":[119],"but":[120],"analyzing":[121],"long-term":[122],"big":[123],"data":[126],"challenge.":[129],"adapt":[131],"technology":[133],"automatically":[137],"unknown":[139],"threats,":[141],"we":[142,155],"previously":[143],"proposed":[144],"system":[146],"called":[147],"MD-Miner.":[148],"improve":[150],"its":[151],"efficiency":[152],"accuracy,":[154],"propose":[156],"MD-MinerP":[158,173,189,213],"here,":[159],"which":[160,219],"generates":[161],"more":[162],"features":[163],"with":[164],"identification":[165],"capabilities":[166],"feature":[169],"extraction":[170],"stage.":[171],"Moreover,":[172],"adapts":[174],"interaction":[175],"profiling":[176],"bipartite":[177,182],"graphs":[178],"instead":[179],"annotated":[181],"graphs.":[183],"The":[184,212],"experimental":[185],"results":[186,196],"show":[187],"that":[188,202],"better":[191],"area":[192],"under":[193],"curve":[194],"(AUC)":[195],"found":[198],"new":[199],"could":[203],"be":[205],"recognized":[206],"other":[208],"threat":[209],"intelligence":[210],"systems.":[211],"exhibits":[214],"both":[215],"scalability":[216],"applicability,":[218],"been":[221],"experimentally":[222],"validated":[223],"on":[224],"actual":[225],"enterprise":[226],"traffic.":[228]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
