{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:31:30Z","timestamp":1725802290760},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T00:00:00Z","timestamp":1483574400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,5]]},"DOI":"10.1145\/3022227.3022260","type":"proceedings-article","created":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T08:39:43Z","timestamp":1486715983000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["C&C session detection using random forest"],"prefix":"10.1145","author":[{"given":"Liang","family":"Lu","sequence":"first","affiliation":[{"name":"Kyushu University, Fukuoka, JAPAN"}]},{"given":"Yaokai","family":"Feng","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, JAPAN"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, JAPAN"}]}],"member":"320","published-online":{"date-parts":[[2017,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"denial of service attack\". Retrieved 26 May 2016. DOI=https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-015 (accessed 2016\/8\/20) \"denial of service attack\" . Retrieved 26 May 2016. DOI=https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-015 (accessed 2016\/8\/20)"},{"key":"e_1_3_2_1_2_1","article-title":"DDoS attacks on the rise - touching 500gbps","author":"Millman","year":"2016","journal-title":"SC Magazine UK. Retrieved"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.007"},{"volume-title":"Springer Berlin Heidelberg, 2007","year":"2016","author":"Kondo","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.65"},{"key":"e_1_3_2_1_6_1","unstructured":"R Development Core Team 2005. R: A Language and Environment for Statistical Computing. DOI= http:\/\/www.r-project.org\/ (accessed 2016\/8\/20) R Development Core Team 2005. R: A Language and Environment for Statistical Computing . DOI= http:\/\/www.r-project.org\/ (accessed 2016\/8\/20)"},{"key":"e_1_3_2_1_7_1","unstructured":"Fortran original by Leo Breiman and Adele Cutler R port by Andy Liaw and Matthew Wiener 2015.:randomForest package DOI=https:\/\/cran.r-project.org\/web\/packages\/randomForest\/index.html (accessed 2016\/8\/20) Fortran original by Leo Breiman and Adele Cutler R port by Andy Liaw and Matthew Wiener 2015.:randomForest package DOI=https:\/\/cran.r-project.org\/web\/packages\/randomForest\/index.html (accessed 2016\/8\/20)"},{"key":"e_1_3_2_1_8_1","unstructured":"Kohavi Ron. \"A study of cross-validation and bootstrap for accuracy estimation and model selection.\" Ijcai. Vol. 14. No. 2. 1995. DOI=https:\/\/www.semanticscholar.org\/paper\/0be0d781305750b37acb35fa187febd8db67bfcc\/pdf (accessed 2016\/8\/20) Kohavi Ron. \"A study of cross-validation and bootstrap for accuracy estimation and model selection.\" Ijcai. Vol. 14. No. 2. 1995. DOI=https:\/\/www.semanticscholar.org\/paper\/0be0d781305750b37acb35fa187febd8db67bfcc\/pdf (accessed 2016\/8\/20)"},{"key":"e_1_3_2_1_9_1","unstructured":"Yamauchi Kawamoto. \"Evaluation of Machine Learning Techniques for C&C traffic Classification\" 56.9 (2015): 1745--1753. DOI=https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&active_action=repository_view_main_item_detail&item_id=145054&item_no=1&page_id=13&block_id=8 (accessed 2016\/8\/20) Yamauchi Kawamoto. \"Evaluation of Machine Learning Techniques for C&C traffic Classification\" 56.9 (2015): 1745--1753. DOI= https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&active_action=repository_view_main_item_detail&item_id=145054&item_no=1&page_id=13&block_id=8 (accessed 2016\/8\/20)"},{"key":"e_1_3_2_1_10_1","unstructured":"2014(MWS2014) DOI=http:\/\/www.iwsec.org\/mws\/2014\/about.html (accessed 2016\/8\/20) 2014(MWS2014) DOI=http:\/\/www.iwsec.org\/mws\/2014\/about.html (accessed 2016\/8\/20)"},{"key":"e_1_3_2_1_11_1","unstructured":"Leo Breiman Adele Culter. Random Forest.DOI=https:\/\/www.stat.berkeley.edu\/~breiman\/RandomForests\/cc_home.htm#varimp (accessed 2016\/8\/20) Leo Breiman Adele Culter. Random Forest .DOI=https:\/\/www.stat.berkeley.edu\/~breiman\/RandomForests\/cc_home.htm#varimp (accessed 2016\/8\/20)"}],"event":{"name":"IMCOM '17: The 11th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Beppu Japan","acronym":"IMCOM '17"},"container-title":["Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3022227.3022260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T22:49:35Z","timestamp":1673477375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3022227.3022260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,5]]},"references-count":11,"alternative-id":["10.1145\/3022227.3022260","10.1145\/3022227"],"URL":"https:\/\/doi.org\/10.1145\/3022227.3022260","relation":{},"subject":[],"published":{"date-parts":[[2017,1,5]]},"assertion":[{"value":"2017-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}