{"id":"https://openalex.org/W2920983311","doi":"https://doi.org/10.23919/apsipa.2018.8659580","title":"Prediction Method of Infection Spreading with CNN for Self-evolving Botnets","display_name":"Prediction Method of Infection Spreading with CNN for Self-evolving Botnets","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2920983311","doi":"https://doi.org/10.23919/apsipa.2018.8659580","mag":"2920983311"},"language":"en","primary_location":{"id":"doi:10.23919/apsipa.2018.8659580","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apsipa.2018.8659580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020242377","display_name":"Keita Kishioka","orcid":null},"institutions":[{"id":"https://openalex.org/I56624758","display_name":"Kansai University","ror":"https://ror.org/03xg1f311","country_code":"JP","type":"education","lineage":["https://openalex.org/I56624758"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Keita Kishioka","raw_affiliation_strings":["Graduate School of Science and Engineering, Kansai University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Engineering, Kansai University, Osaka, Japan","institution_ids":["https://openalex.org/I56624758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020516572","display_name":"Koki Hongyo","orcid":null},"institutions":[{"id":"https://openalex.org/I56624758","display_name":"Kansai University","ror":"https://ror.org/03xg1f311","country_code":"JP","type":"education","lineage":["https://openalex.org/I56624758"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Koki Hongyo","raw_affiliation_strings":["Graduate School of Science and Engineering, Kansai University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Engineering, Kansai University, Osaka, Japan","institution_ids":["https://openalex.org/I56624758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079640692","display_name":"Tomotaka Kimura","orcid":"https://orcid.org/0000-0003-0677-9767"},"institutions":[{"id":"https://openalex.org/I133984924","display_name":"Doshisha University","ror":"https://ror.org/01fxdkm29","country_code":"JP","type":"education","lineage":["https://openalex.org/I133984924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomotaka Kimura","raw_affiliation_strings":["Faculty of Science and Engineering, Doshisha University, Kyoto, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and Engineering, Doshisha University, Kyoto, Japan","institution_ids":["https://openalex.org/I133984924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110502864","display_name":"Kudo Takanori","orcid":null},"institutions":[{"id":"https://openalex.org/I102826571","display_name":"Setsunan University","ror":"https://ror.org/0418a3v02","country_code":"JP","type":"education","lineage":["https://openalex.org/I102826571"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takanori Kudo","raw_affiliation_strings":["Faculty of Science and Engineering, Setsunan University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and Engineering, Setsunan University, Osaka, Japan","institution_ids":["https://openalex.org/I102826571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061344969","display_name":"Yoshiaki Inoue","orcid":"https://orcid.org/0000-0002-2483-7652"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshiaki Inoue","raw_affiliation_strings":["Graduate School of Engineering, Osaka University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Engineering, Osaka University, Osaka, Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087962607","display_name":"Kouji Hirata","orcid":"https://orcid.org/0000-0002-9607-6864"},"institutions":[{"id":"https://openalex.org/I56624758","display_name":"Kansai University","ror":"https://ror.org/03xg1f311","country_code":"JP","type":"education","lineage":["https://openalex.org/I56624758"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kouji Hirata","raw_affiliation_strings":["Faculty of Engineering Science, Kansai University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering Science, Kansai University, Osaka, Japan","institution_ids":["https://openalex.org/I56624758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5020242377"],"corresponding_institution_ids":["https://openalex.org/I56624758"],"apc_list":null,"apc_paid":null,"fwci":0.1845,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59105551,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1810","last_page":"1815"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9374890327453613},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8461465239524841},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6753137111663818},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5899187326431274},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5124440789222717},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4928920269012451},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.4719254970550537},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34903812408447266},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21348494291305542},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1218436062335968},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08909642696380615}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9374890327453613},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8461465239524841},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6753137111663818},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5899187326431274},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5124440789222717},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4928920269012451},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.4719254970550537},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34903812408447266},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21348494291305542},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1218436062335968},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08909642696380615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/apsipa.2018.8659580","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apsipa.2018.8659580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W133470593","https://openalex.org/W1756175326","https://openalex.org/W2008620264","https://openalex.org/W2047181172","https://openalex.org/W2079753286","https://openalex.org/W2092375860","https://openalex.org/W2102671922","https://openalex.org/W2112090702","https://openalex.org/W2132560615","https://openalex.org/W2136922672","https://openalex.org/W2168231600","https://openalex.org/W2200374509","https://openalex.org/W2293458749","https://openalex.org/W2513770602","https://openalex.org/W2797942597","https://openalex.org/W2962949934","https://openalex.org/W6605468800","https://openalex.org/W6684859321"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W2938399969","https://openalex.org/W3187581118","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964"],"abstract_inverted_index":{"Recently,":[0],"machine":[1,33],"learning":[2,34],"has":[3,18],"been":[4],"extensively":[5],"used":[6],"and":[7,29,104],"achieved":[8],"significant":[9],"results":[10],"in":[11],"many":[12],"research":[13],"areas.":[14],"Accordingly,":[15],"the":[16,20,47,74,91,124,127],"literature":[17],"suggested":[19],"appearance":[21],"of":[22,38,50,73,77,93,96,112,126],"self-evolving":[23,51,78,97],"botnets,":[24,79,98],"which":[25,80,99],"autonomously":[26],"discover":[27],"vulnerabilities":[28],"evolve":[30],"by":[31,108],"performing":[32],"with":[35],"computing":[36],"resources":[37],"zombie":[39],"computers.":[40],"Our":[41],"previous":[42],"work":[43],"have":[44],"shown":[45],"that":[46],"infection":[48,75,94],"dynamics":[49,76],"botnets":[52],"depend":[53],"on":[54,63,101,134],"connection":[55],"relations":[56],"among":[57],"hosts,":[58,107],"through":[59,130],"simulation":[60,138],"experiments":[61],"based":[62,133],"a":[64,70,82],"Markov":[65],"chain.":[66],"This":[67],"paper":[68],"proposes":[69],"prediction":[71],"method":[72,89,129],"uses":[81],"convolutional":[83],"neural":[84],"network":[85,102],"(CNN).":[86],"The":[87],"proposed":[88,128],"predicts":[90],"level":[92],"spreading":[95],"depends":[100],"structures":[103],"initial":[105],"infected":[106],"using":[109],"adjacency":[110],"matrices":[111],"hosts":[113],"as":[114],"input":[115],"data":[116,135],"to":[117],"CNN.":[118],"In":[119],"this":[120],"paper,":[121],"we":[122],"show":[123],"effectiveness":[125],"performance":[131],"evaluation":[132],"obtained":[136],"from":[137],"experiments.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
