{"id":"https://openalex.org/W3196661687","doi":"https://doi.org/10.3233/jifs-210699","title":"Towards effectively feature graph-based IoT botnet detection via reinforcement learning","display_name":"Towards effectively feature graph-based IoT botnet detection via reinforcement learning","publication_year":2021,"publication_date":"2021-08-31","ids":{"openalex":"https://openalex.org/W3196661687","doi":"https://doi.org/10.3233/jifs-210699","mag":"3196661687"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-210699","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-210699","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062284906","display_name":"Quoc-Dung Ngo","orcid":"https://orcid.org/0000-0002-4133-3499"},"institutions":[{"id":"https://openalex.org/I4400600977","display_name":"Posts and Telecommunications Institute of Technology","ror":"https://ror.org/0363rtq22","country_code":null,"type":"education","lineage":["https://openalex.org/I4400600977"]},{"id":"https://openalex.org/I4210095603","display_name":"Vietnam Posts and Telecommunications Group (Vietnam)","ror":"https://ror.org/00q0e7f94","country_code":"VN","type":"company","lineage":["https://openalex.org/I4210095603"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Quoc-Dung Ngo","raw_affiliation_strings":["Posts and Telecommunications Institute of Technology, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Posts and Telecommunications Institute of Technology, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210095603","https://openalex.org/I4400600977"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039570450","display_name":"Huy\u2010Trung Nguyen","orcid":"https://orcid.org/0000-0002-2710-5326"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Huy-Trung Nguyen","raw_affiliation_strings":["People\u2019s Security Academy, Hanoi, Vietnam","People's Security Academy, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"People\u2019s Security Academy, Hanoi, Vietnam","institution_ids":[]},{"raw_affiliation_string":"People's Security Academy, Hanoi, Vietnam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007780105","display_name":"Le\u2013Cuong Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I121799043","display_name":"Electric Power University","ror":"https://ror.org/01p4b7n26","country_code":"VN","type":"education","lineage":["https://openalex.org/I121799043"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Le-Cuong Nguyen","raw_affiliation_strings":["Electric Power University, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Electric Power University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I121799043"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039570450"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3056,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59628745,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"41","issue":"6","first_page":"6801","last_page":"6814"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9804723262786865},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8627859354019165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8258877992630005},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5541413426399231},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4950956404209137},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4860382676124573},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4297845959663391},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.42962098121643066},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42690175771713257},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.41428500413894653},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36222952604293823},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.158494770526886},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1344994306564331}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9804723262786865},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8627859354019165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8258877992630005},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5541413426399231},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4950956404209137},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4860382676124573},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4297845959663391},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.42962098121643066},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42690175771713257},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.41428500413894653},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36222952604293823},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.158494770526886},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1344994306564331},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-210699","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-210699","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W568760110","https://openalex.org/W1901616594","https://openalex.org/W1996975221","https://openalex.org/W2011778831","https://openalex.org/W2047181172","https://openalex.org/W2128569883","https://openalex.org/W2360903897","https://openalex.org/W2576765166","https://openalex.org/W2598939142","https://openalex.org/W2784097977","https://openalex.org/W2803881474","https://openalex.org/W2889825749","https://openalex.org/W2892077825","https://openalex.org/W2900633536","https://openalex.org/W2948308728","https://openalex.org/W2981856772","https://openalex.org/W2983270658","https://openalex.org/W2991680373","https://openalex.org/W2999221729","https://openalex.org/W3009152417","https://openalex.org/W3015246755","https://openalex.org/W3015471529","https://openalex.org/W3016607949","https://openalex.org/W3024340288","https://openalex.org/W3094951560","https://openalex.org/W3100857292","https://openalex.org/W4249349924","https://openalex.org/W6677067356"],"related_works":["https://openalex.org/W2771198651","https://openalex.org/W2929621094","https://openalex.org/W2093401155","https://openalex.org/W2902215642","https://openalex.org/W3211806875","https://openalex.org/W4316087074","https://openalex.org/W2942650110","https://openalex.org/W2939441294","https://openalex.org/W4226471275","https://openalex.org/W4200401563"],"abstract_inverted_index":{"Over":[0],"the":[1,15,73,107,118,128],"last":[2],"decade,":[3],"due":[4],"to":[5],"exponential":[6],"growth":[7],"in":[8,34,65,105,117,127],"IoT":[9,16,39,43,67,84,109],"devices":[10],"and":[11,87,134],"weak":[12],"security":[13,21,32],"mechanisms,":[14],"is":[17,49],"now":[18],"facing":[19],"more":[20],"challenges":[22],"than":[23],"ever":[24],"before,":[25],"especially":[26],"botnet":[27,36,44,68,85,110],"malware.":[28],"There":[29],"are":[30],"many":[31],"solutions":[33],"detecting":[35,42,106],"malware":[37],"on":[38],"devices.":[40],"However,":[41],"malware,":[45,86],"particularly":[46],"multi-architecture":[47,66],"botnets,":[48],"challenging.":[50],"This":[51],"paper":[52],"proposes":[53],"a":[54,77,89,112],"graphically":[55],"structured":[56],"feature":[57],"extraction":[58],"mechanism":[59],"integrated":[60],"with":[61,94],"reinforcement":[62],"learning":[63],"techniques":[64],"detection.":[69],"We":[70],"then":[71],"evaluate":[72],"proposed":[74,99],"approach":[75,100],"using":[76],"dataset":[78,120],"of":[79,92],"22849":[80],"samples,":[81],"including":[82],"actual":[83],"achieve":[88],"detection":[90],"rate":[91],"98.03":[93],"low":[95],"time":[96],"consumption.":[97],"The":[98],"also":[101],"achieves":[102],"reliable":[103],"results":[104],"new":[108,113],"(has":[111],"architecture-processor)":[114],"not":[115],"appearing":[116],"training":[119],"at":[121],"96.69.":[122],"To":[123],"promote":[124],"future":[125],"research":[126],"field,":[129],"we":[130],"share":[131],"relevant":[132],"datasets":[133],"source":[135],"code.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
