{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:10:12Z","timestamp":1730322612338,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","funder":[{"name":"Universiti Teknikal Malaysia Melaka (UTeM)","award":["GLUAR\/CSM\/2016\/FTMK-CACT\/100013"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,20]]},"DOI":"10.1145\/3377170.3377222","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T11:16:22Z","timestamp":1584702982000},"page":"344-352","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An IoT Botnet Prediction Model Using Frequency based Dependency Graph"],"prefix":"10.1145","author":[{"given":"Warusia","family":"Yassin","sequence":"first","affiliation":[{"name":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"}]},{"given":"Raihana","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"}]},{"given":"Mohd Faizal","family":"Abdollah","sequence":"additional","affiliation":[{"name":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"}]},{"given":"Zaki","family":"Mas'ud","sequence":"additional","affiliation":[{"name":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"}]},{"given":"Farah Adeliena","family":"Bakhari","sequence":"additional","affiliation":[{"name":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"S. Engineering \"Cyber Physical Systems in the Context of \" pp. 2--4 2014. S. Engineering \"Cyber Physical Systems in the Context of \" pp. 2--4 2014."},{"key":"e_1_3_2_1_2_1","volume-title":"IoT Security: Ongoing Challenges and Research Opportunities","author":"Zhang Z.","year":"2014","unstructured":"Z. Zhang , \" IoT Security: Ongoing Challenges and Research Opportunities ,\" 2014 . Z. Zhang et al., \"IoT Security: Ongoing Challenges and Research Opportunities,\" 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-sampled Packet Traffic Analysis","author":"Lim A. K. B","year":"2019","unstructured":"A. K. B and T. J. Lim , Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-sampled Packet Traffic Analysis . Springer International Publishing , 2019 . A. K. B and T. J. Lim, Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-sampled Packet Traffic Analysis. Springer International Publishing, 2019."},{"key":"e_1_3_2_1_4_1","unstructured":"R. Arsenault \"An IoT Device...To Protect Your IoT Devices \" 2015. [Online]. Available: https:\/\/www.aberdeen.com\/techpro-essentials\/an-iot-deviceto-protect-your-iot-devices\/. R. Arsenault \"An IoT Device...To Protect Your IoT Devices \" 2015. [Online]. Available: https:\/\/www.aberdeen.com\/techpro-essentials\/an-iot-deviceto-protect-your-iot-devices\/."},{"key":"e_1_3_2_1_5_1","unstructured":"G. Sergiu \"IoT Attacks Escalating with a 217.5% Increase in Volume \" 2019. [Online]. Available: https:\/\/www.bleepingcomputer.com\/news\/security\/iot-attacks-escalating-with-a-2175-percent-increase-in-volume\/. G. Sergiu \"IoT Attacks Escalating with a 217.5% Increase in Volume \" 2019. [Online]. Available: https:\/\/www.bleepingcomputer.com\/news\/security\/iot-attacks-escalating-with-a-2175-percent-increase-in-volume\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges","author":"Khan R.","year":"2012","unstructured":"R. Khan , S. U. Khan , R. Zaheer , and S. Khan , \" Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges ,\" 2012 . R. Khan, S. U. Khan, R. Zaheer, and S. Khan, \"Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges,\" 2012."},{"key":"e_1_3_2_1_7_1","unstructured":"Statista \"Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) \" https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/ 2019. Statista \"Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) \" https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/ 2019."},{"key":"e_1_3_2_1_8_1","first-page":"506","volume-title":"ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis","author":"Meidan Y.","year":"2017","unstructured":"Y. Meidan , M. Bohadana , A. Shabtai , J. D. Guarnizo , N. O. Tippenhauer , and Y. Elovici , \" ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis ,\" pp. 506 -- 509 , 2017 . Y. Meidan, M. Bohadana, A. Shabtai, J. D. Guarnizo, N. O. Tippenhauer, and Y. Elovici, \"ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis,\" pp. 506--509, 2017."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_2_1_10_1","unstructured":"K. D. Foote \"A Brief History of the Internet of Things \" https:\/\/www.dataversity.net\/brief-history-internet-things\/ 2016. K. D. Foote \"A Brief History of the Internet of Things \" https:\/\/www.dataversity.net\/brief-history-internet-things\/ 2016."},{"volume-title":"Architectures, Emerging Trends and Potential Opportunities,\"","author":"Irmak E.","key":"e_1_3_2_1_11_1","unstructured":"E. Irmak , \"Internet of Things (IoT) : The Most Up-To-Date Challenges , Architectures, Emerging Trends and Potential Opportunities,\" vol. 179 , no. 40, pp. 20--27, 2018. E. Irmak, \"Internet of Things (IoT): The Most Up-To-Date Challenges, Architectures, Emerging Trends and Potential Opportunities,\" vol. 179, no. 40, pp. 20--27, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"e_1_3_2_1_13_1","unstructured":"K. Lab \"New IoT-malware grew three-fold in H1--2018 \" https:\/\/www.kaspersky.com\/about\/press-releases\/2018_new-iot-malware-grew-three-fold-in-h1--2018 2018. K. Lab \"New IoT-malware grew three-fold in H1--2018 \" https:\/\/www.kaspersky.com\/about\/press-releases\/2018_new-iot-malware-grew-three-fold-in-h1--2018 2018."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.01.002"},{"key":"e_1_3_2_1_15_1","unstructured":"MYCERT \"Reported Incidents based on General Incident Classification Statistics 2018 \" 2018. MYCERT \"Reported Incidents based on General Incident Classification Statistics 2018 \" 2018."},{"key":"e_1_3_2_1_16_1","first-page":"5","volume-title":"12th Int. Conf. Inf. Integr. Web-based Appl. Serv. - iiWAS '10","author":"Kim W.","year":"2010","unstructured":"W. Kim , O.-R. Jeong , C. Kim , and J. So , \" On botnets,\" Proc . 12th Int. Conf. Inf. Integr. Web-based Appl. Serv. - iiWAS '10 , no. 2, p. 5 , 2010 . W. Kim, O.-R. Jeong, C. Kim, and J. So, \"On botnets,\" Proc. 12th Int. Conf. Inf. Integr. Web-based Appl. Serv. - iiWAS '10, no. 2, p. 5, 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1240882"},{"issue":"2","key":"e_1_3_2_1_18_1","first-page":"208","article-title":"Revealing the Criterion on Botnet Detection Technique","volume":"10","author":"Abdullah R.","year":"2013","unstructured":"R. Abdullah and M. Abdollah , \" Revealing the Criterion on Botnet Detection Technique ,\" IJCSI Int. J. Comput. Sci. Issues , vol. 10 , no. 2 , pp. 208 -- 215 , 2013 . R. Abdullah and M. Abdollah, \"Revealing the Criterion on Botnet Detection Technique,\" IJCSI Int. J. Comput. Sci. Issues, vol. 10, no. 2, pp. 208--215, 2013.","journal-title":"IJCSI Int. J. Comput. Sci. Issues"},{"volume-title":"A Taxonomy of Botnet Behavior","author":"Khattak S.","key":"e_1_3_2_1_19_1","unstructured":"S. Khattak , N. R. Ramay , K. R. Khan , A. A. Syed , and S. A. Khayam , \" A Taxonomy of Botnet Behavior ,\" vol. 16 , no. 2, pp. 898--924, 2014. S. Khattak, N. R. Ramay, K. R. Khan, A. A. Syed, and S. A. Khayam, \"A Taxonomy of Botnet Behavior,\" vol. 16, no. 2, pp. 898--924, 2014."},{"key":"e_1_3_2_1_20_1","volume-title":"Botnet Detection using NetFlow and Clustering Botnet Detection using NetFlow and Clustering,\" no","author":"Amini P.","year":"2014","unstructured":"P. Amini , R. Azmi , and M. Araghizadeh , \" Botnet Detection using NetFlow and Clustering Botnet Detection using NetFlow and Clustering,\" no . March , 2014 . P. Amini, R. Azmi, and M. Araghizadeh, \"Botnet Detection using NetFlow and Clustering Botnet Detection using NetFlow and Clustering,\" no. March, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Understanding the Mirai Botnet This paper is included in the Proceedings of the Understanding the Mirai Botnet","author":"Antonakakis M.","year":"2017","unstructured":"M. Antonakakis , \" Understanding the Mirai Botnet This paper is included in the Proceedings of the Understanding the Mirai Botnet ,\" 2017 . M. Antonakakis et al., \"Understanding the Mirai Botnet This paper is included in the Proceedings of the Understanding the Mirai Botnet,\" 2017."},{"key":"e_1_3_2_1_22_1","first-page":"148","volume-title":"An adaptive framework for the detection of novel botnets","author":"J.","year":"2018","unstructured":"J. \u00c1. Cid-fuentes, C. Szabo , and K. Falkner , \" An adaptive framework for the detection of novel botnets ,\" vol. 79 , pp. 148 -- 161 , 2018 . J. \u00c1. Cid-fuentes, C. Szabo, and K. Falkner, \"An adaptive framework for the detection of novel botnets,\" vol. 79, pp. 148--161, 2018."},{"key":"e_1_3_2_1_23_1","first-page":"42","article-title":"Detecting botnet by anomalous traffic*","volume":"21","author":"Chen C.","year":"2014","unstructured":"C. Chen and H. Lin , \" Detecting botnet by anomalous traffic* ,\" J. Inf. Secur. Appl. , vol. 21 , pp. 42 -- 51 , 2014 . C. Chen and H. Lin, \"Detecting botnet by anomalous traffic*,\" J. Inf. Secur. Appl., vol. 21, pp. 42--51, 2014.","journal-title":"J. Inf. Secur. Appl."},{"key":"e_1_3_2_1_24_1","first-page":"139","volume-title":"BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection","author":"Gu G.","year":"2015","unstructured":"G. Gu , R. Perdisci , J. Zhang , and W. Lee , \" BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection ,\" pp. 139 -- 154 , 2015 . G. Gu, R. Perdisci, J. Zhang, and W. Lee, \"BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection,\" pp. 139--154, 2015."},{"key":"e_1_3_2_1_25_1","first-page":"118","volume-title":"Conf. Inf. Commun. Signal Process., no. Icsp","author":"Nguyen H.","year":"2018","unstructured":"H. Nguyen , \"Io T Botnet Detection Approach Based on PSI graph and DGCNN classifier,\" 2018 IEEE Int . Conf. Inf. Commun. Signal Process., no. Icsp , pp. 118 -- 122 , 2018 . H. Nguyen, \"IoT Botnet Detection Approach Based on PSI graph and DGCNN classifier,\" 2018 IEEE Int. Conf. Inf. Commun. Signal Process., no. Icsp, pp. 118--122, 2018."},{"key":"e_1_3_2_1_26_1","volume-title":"A Graph-Based Machine Learning Approach for Bot Detection,\" no","author":"Daya A. A.","year":"2019","unstructured":"A. A. Daya , M. A. Salahuddin , N. Limam , and R. Boutaba , \" A Graph-Based Machine Learning Approach for Bot Detection,\" no . April , 2019 . A. A. Daya, M. A. Salahuddin, N. Limam, and R. Boutaba, \"A Graph-Based Machine Learning Approach for Bot Detection,\" no. April, 2019."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.007"},{"key":"e_1_3_2_1_28_1","first-page":"456","article-title":"Modeling and clustering attacker activities in IoT through machine learning techniques","volume":"479","author":"Li J.","year":"2018","unstructured":"J. Li , B. Li , L. Wang , P. Sun , and M. Z. Alam Bhuiyan , \" Modeling and clustering attacker activities in IoT through machine learning techniques ,\" Inf. Sci. (Ny). , vol. 479 , pp. 456 -- 471 , 2018 . J. Li, B. Li, L. Wang, P. Sun, and M. Z. Alam Bhuiyan, \"Modeling and clustering attacker activities in IoT through machine learning techniques,\" Inf. Sci. (Ny)., vol. 479, pp. 456--471, 2018.","journal-title":"Inf. Sci. (Ny)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0267-1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.013"},{"key":"e_1_3_2_1_31_1","first-page":"439","volume-title":"Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis","author":"Nagaraja S.","year":"2014","unstructured":"S. Nagaraja , \"Botyacc : Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis ,\" pp. 439 -- 456 , 2014 . S. Nagaraja, \"Botyacc: Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis,\" pp. 439--456, 2014."},{"key":"e_1_3_2_1_32_1","first-page":"1","volume-title":"Fast malware classification by automated behavioral graph matching","author":"Park Y.","year":"2010","unstructured":"Y. Park , D. Reeves , V. Mulukutla , and B. Sundaravel , \" Fast malware classification by automated behavioral graph matching ,\" p. 1 , 2010 . Y. Park, D. Reeves, V. Mulukutla, and B. Sundaravel, \"Fast malware classification by automated behavioral graph matching,\" p. 1, 2010."}],"event":{"name":"ICIT 2019: IoT and Smart City","sponsor":["Shanghai Jiao Tong University Shanghai Jiao Tong University","The Hong Kong Polytechnic The Hong Kong Polytechnic University","University of Malaya University of Malaya"],"location":"Shanghai China","acronym":"ICIT 2019"},"container-title":["Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377170.3377222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T16:27:50Z","timestamp":1680798470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377170.3377222"}},"subtitle":["Proof-of-concept"],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":32,"alternative-id":["10.1145\/3377170.3377222","10.1145\/3377170"],"URL":"https:\/\/doi.org\/10.1145\/3377170.3377222","relation":{},"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"2020-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}