{"id":"https://openalex.org/W2345270836","doi":"https://doi.org/10.5220/0005684902900298","title":"Detecting Botnets using a Collaborative Situational-aware IDPS","display_name":"Detecting Botnets using a Collaborative Situational-aware IDPS","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2345270836","doi":"https://doi.org/10.5220/0005684902900298","mag":"2345270836"},"language":"en","primary_location":{"id":"doi:10.5220/0005684902900298","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005684902900298","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005684902900298","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090765580","display_name":"Maria Mathews","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Lisa Mathews","raw_affiliation_strings":["University of Maryland, United States"],"affiliations":[{"raw_affiliation_string":"University of Maryland, United States","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020975010","display_name":"Anupam Joshi","orcid":"https://orcid.org/0000-0002-8641-3193"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anupam Joshi","raw_affiliation_strings":["University of Maryland, United States"],"affiliations":[{"raw_affiliation_string":"University of Maryland, United States","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009972149","display_name":"Tim Finin","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tim Finin","raw_affiliation_strings":["University of Maryland, United States"],"affiliations":[{"raw_affiliation_string":"University of Maryland, United States","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090765580"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":0.5791,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.7027838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"290","last_page":"298"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9046249985694885},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6740917563438416},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.5405077338218689},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46464085578918457},{"id":"https://openalex.org/keywords/situational-ethics","display_name":"Situational ethics","score":0.44372472167015076},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.38657280802726746},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19370189309120178},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1501244306564331},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13842913508415222},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.0879812240600586}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9046249985694885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6740917563438416},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.5405077338218689},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46464085578918457},{"id":"https://openalex.org/C9114305","wikidata":"https://www.wikidata.org/wiki/Q1428317","display_name":"Situational ethics","level":2,"score":0.44372472167015076},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.38657280802726746},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19370189309120178},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1501244306564331},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13842913508415222},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0879812240600586},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005684902900298","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005684902900298","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005684902900298","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005684902900298","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1487060125","https://openalex.org/W1965836830","https://openalex.org/W2063948318","https://openalex.org/W2066279840","https://openalex.org/W2072729271","https://openalex.org/W2102262986","https://openalex.org/W2107173149","https://openalex.org/W2138524462","https://openalex.org/W2142226691","https://openalex.org/W2145959654","https://openalex.org/W2154874878"],"related_works":["https://openalex.org/W3159690896","https://openalex.org/W1989286518","https://openalex.org/W2921012173","https://openalex.org/W2124456408","https://openalex.org/W2945572725","https://openalex.org/W2758517546","https://openalex.org/W2313847479","https://openalex.org/W1975315982","https://openalex.org/W3134680667","https://openalex.org/W2804396347"],"abstract_inverted_index":{"Botnet":[0],"attacks":[1,37,85,167],"turn":[2],"susceptible":[3],"victim":[4],"computers":[5],"into":[6],"bots":[7],"that":[8,140,160],"perform":[9],"various":[10],"malicious":[11],"activities":[12],"while":[13],"under":[14],"the":[15,23,41,54,67],"control":[16],"of":[17,22,29,43,101,111,144],"a":[18,134,142,155],"botmaster.":[19],"Some":[20],"examples":[21],"damage":[24],"they":[25,73],"cause":[26],"include":[27],"denial":[28],"service,":[30],"click":[31],"fraud,":[32],"spamware,":[33],"and":[34,45,59,91,118],"phishing.":[35],"These":[36],"can":[38,96],"vary":[39],"in":[40,93],"type":[42],"architecture":[44],"communication":[46],"protocol":[47],"used,":[48],"which":[49],"might":[50],"be":[51,97],"modified":[52,79],"during":[53],"botnet":[55],"lifespan.":[56],"Intrusion":[57],"detection":[58,139],"prevention":[60],"systems":[61,69],"are":[62,107,132],"one":[63],"way":[64],"to":[65,137,154,164],"safeguard":[66],"cyber-physical":[68],"we":[70,131],"use,":[71],"but":[72],"have":[74,88,119],"difficulty":[75,120],"detecting":[76],"new":[77,122],"or":[78,123],"attacks,":[80],"including":[81],"botnets.":[82,170],"Only":[83],"known":[84],"whose":[86],"signatures":[87],"been":[89],"identified":[90],"stored":[92],"some":[94],"form":[95],"discovered":[98],"by":[99],"most":[100],"these":[102,129,150],"systems.":[103],"Also,":[104],"traditional":[105],"IDPSs":[106],"point-based":[108],"solutions":[109],"incapable":[110],"utilizing":[112],"information":[113,148],"from":[114,149],"multiple":[115],"data":[116],"sources":[117,152],"discovering":[121],"more":[124,156],"complex":[125],"attacks.":[126],"To":[127],"address":[128],"issues,":[130],"developing":[133],"semantic":[135],"approach":[136],"intrusion":[138],"uses":[141],"variety":[143],"sensors":[145],"collaboratively.":[146],"Leveraging":[147],"heterogeneous":[151],"leads":[153],"robust,":[157],"situational-aware":[158],"IDPS":[159],"is":[161],"better":[162],"equipped":[163],"detect":[165],"complicated":[166],"such":[168],"as":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
