{"id":"https://openalex.org/W3010383968","doi":"https://doi.org/10.23919/cnsm46954.2019.9012710","title":"Learning From Evolving Network Data for Dependable Botnet Detection","display_name":"Learning From Evolving Network Data for Dependable Botnet Detection","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3010383968","doi":"https://doi.org/10.23919/cnsm46954.2019.9012710","mag":"3010383968"},"language":"en","primary_location":{"id":"doi:10.23919/cnsm46954.2019.9012710","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm46954.2019.9012710","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 15th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073159178","display_name":"Duc C. Le","orcid":"https://orcid.org/0000-0002-4407-2626"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Duc C. Le","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008462534","display_name":"A. Nur Zincir\u2010Heywood","orcid":"https://orcid.org/0000-0003-2796-7265"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Nur Zincir-Heywood","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada","institution_ids":["https://openalex.org/I129902397"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073159178"],"corresponding_institution_ids":["https://openalex.org/I129902397"],"apc_list":null,"apc_paid":null,"fwci":0.3537,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65867658,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9656564593315125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7866746783256531},{"id":"https://openalex.org/keywords/genetic-programming","display_name":"Genetic programming","score":0.7633445858955383},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6407078504562378},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6258149147033691},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6028792858123779},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5698872208595276},{"id":"https://openalex.org/keywords/evolutionary-computation","display_name":"Evolutionary computation","score":0.5395073294639587},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.4180573523044586},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3205130100250244},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18459847569465637}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9656564593315125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7866746783256531},{"id":"https://openalex.org/C110332635","wikidata":"https://www.wikidata.org/wiki/Q629498","display_name":"Genetic programming","level":2,"score":0.7633445858955383},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6407078504562378},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6258149147033691},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6028792858123779},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5698872208595276},{"id":"https://openalex.org/C105902424","wikidata":"https://www.wikidata.org/wiki/Q1197129","display_name":"Evolutionary computation","level":2,"score":0.5395073294639587},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.4180573523044586},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3205130100250244},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18459847569465637},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cnsm46954.2019.9012710","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm46954.2019.9012710","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 15th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1152223117","https://openalex.org/W1530215515","https://openalex.org/W1966809779","https://openalex.org/W2026621111","https://openalex.org/W2050513182","https://openalex.org/W2071436263","https://openalex.org/W2077488147","https://openalex.org/W2123387822","https://openalex.org/W2130416896","https://openalex.org/W2139669429","https://openalex.org/W2159397308","https://openalex.org/W2162275200","https://openalex.org/W2331488455","https://openalex.org/W2342408547","https://openalex.org/W2528827134","https://openalex.org/W2732916693","https://openalex.org/W2758096849","https://openalex.org/W2884123408","https://openalex.org/W2886334640","https://openalex.org/W2898625021","https://openalex.org/W3121006491"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W3143747655","https://openalex.org/W2091246427","https://openalex.org/W1971758741","https://openalex.org/W2029013302","https://openalex.org/W1589480767","https://openalex.org/W1523210215"],"abstract_inverted_index":{"This":[0,72],"work":[1,65],"presents":[2],"an":[3,37,48,79],"emerging":[4],"problem":[5],"in":[6,13,16,25],"real-world":[7],"applications":[8],"of":[9,77],"machine":[10],"learning":[11],"(ML)":[12],"cybersecurity,":[14],"particularly":[15],"botnet":[17,82],"detection,":[18],"where":[19,87],"the":[20,23,26,31,74],"dynamics":[21],"and":[22,91],"evolution":[24],"deployment":[27],"environments":[28],"may":[29],"render":[30],"ML":[32],"solutions":[33],"inadequate.":[34],"We":[35],"propose":[36],"approach":[38,80],"to":[39,60,64,96],"tackle":[40],"this":[41],"challenge":[42],"using":[43],"Genetic":[44],"Programming":[45],"(GP)":[46],"-":[47],"evolutionary":[49],"computation":[50],"based":[51],"approach.":[52],"Preliminary":[53],"results":[54],"show":[55],"that":[56],"GP":[57],"is":[58],"able":[59],"evolve":[61],"pre-trained":[62],"classifiers":[63],"under":[66,84],"evolved":[67],"(expanded)":[68],"feature":[69],"space":[70],"conditions.":[71],"indicates":[73],"potential":[75],"use":[76],"such":[78],"for":[81],"detection":[83],"non-stationary":[85],"environments,":[86],"much":[88],"less":[89],"data":[90],"training":[92],"time":[93],"are":[94],"required":[95],"obtain":[97],"a":[98],"reliable":[99],"classifier":[100],"as":[101],"new":[102],"network":[103],"conditions":[104],"arise.":[105]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
