{"id":"https://openalex.org/W2108005341","doi":"https://doi.org/10.1109/glocom.2008.ecp.398","title":"Botnets Detection Based on IRC-Community","display_name":"Botnets Detection Based on IRC-Community","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2108005341","doi":"https://doi.org/10.1109/glocom.2008.ecp.398","mag":"2108005341"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2008.ecp.398","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039346080","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4150-8674"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Wei Lu","raw_affiliation_strings":["Fac. of Comput. Sci, Univ. of New Brunswick, Fredericton, NB"],"affiliations":[{"raw_affiliation_string":"Fac. of Comput. Sci, Univ. of New Brunswick, Fredericton, NB","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034685391","display_name":"Ali A. Ghorbani","orcid":"https://orcid.org/0000-0001-9189-6268"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ali A. Ghorbani","raw_affiliation_strings":["Fac. of Comput. Sci, Univ. of New Brunswick, Fredericton, NB"],"affiliations":[{"raw_affiliation_string":"Fac. of Comput. Sci, Univ. of New Brunswick, Fredericton, NB","institution_ids":["https://openalex.org/I106938459"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.474,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":19,"citation_normalized_percentile":{"value":0.902592,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.98991305},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.74300337},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.7032325},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and Control","score":0.6587355},{"id":"https://openalex.org/keywords/netflow","display_name":"NetFlow","score":0.42466572}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.98991305},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7883339},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.74300337},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.7032325},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.6587355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.54650414},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5404727},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47657967},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4463453},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.42985564},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.42933685},{"id":"https://openalex.org/C188067584","wikidata":"https://www.wikidata.org/wiki/Q219363","display_name":"NetFlow","level":2,"score":0.42466572},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16936928},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1213336},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08526409},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.08329287}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2008.ecp.398","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.67,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1462349742","https://openalex.org/W1513323201","https://openalex.org/W1521553548","https://openalex.org/W1551618785","https://openalex.org/W1551705282","https://openalex.org/W1583098994","https://openalex.org/W1873122431","https://openalex.org/W1909494783","https://openalex.org/W191098608","https://openalex.org/W1988741337","https://openalex.org/W202500387","https://openalex.org/W2061455058","https://openalex.org/W2073089243","https://openalex.org/W2102671922","https://openalex.org/W2103049871","https://openalex.org/W2119271160","https://openalex.org/W2141806397","https://openalex.org/W2152969395","https://openalex.org/W2157349061","https://openalex.org/W2171770082","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W86804927","https://openalex.org/W3120717340","https://openalex.org/W2898126008","https://openalex.org/W2596409024","https://openalex.org/W2567044960","https://openalex.org/W2184748140","https://openalex.org/W2110675786","https://openalex.org/W2052466667","https://openalex.org/W1679070068","https://openalex.org/W1583098994"],"abstract_inverted_index":{"Botnets":[0],"are":[1,28,52],"networks":[2],"of":[3,121,127],"compromised":[4],"computers":[5],"controlled":[6],"under":[7],"a":[8,44,74,83,104,157,178],"common":[9],"command":[10,59],"and":[11,79,103,108,161,182],"control":[12],"(C&C)":[13],"channel.":[14],"Recognized":[15],"as":[16],"one":[17],"the":[18,41,93,111,118,125,164,169],"most":[19],"serious":[20],"security":[21],"threats":[22],"on":[23,60,82,117,156],"current":[24],"Internet":[25],"infrastructure,":[26],"botnets":[27,51,81],"often":[29],"hidden":[30],"in":[31,88],"existing":[32],"applications,":[33],"e.g.":[34],"IRC,":[35],"HTTP,":[36],"or":[37,64],"Peer-to-Peer,":[38],"which":[39,89],"makes":[40],"botnet":[42,170],"detection":[43,180],"challenging":[45],"problem.":[46],"Previous":[47],"attempts":[48],"for":[49,57,77],"detecting":[50,78],"to":[53],"examine":[54],"traffic":[55,95,137],"content":[56],"IRC":[58,113,129,136],"selected":[61],"network":[62,94,160],"links":[63],"by":[65,99,132,139],"setting":[66],"up":[67],"honeypots.":[68],"In":[69],"this":[70],"paper,":[71],"we":[72,90],"propose":[73],"new":[75],"approach":[76,145,166],"characterizing":[80],"large-scale":[84],"WiFi":[85],"ISP":[86],"network,":[87],"first":[91],"classify":[92],"into":[96],"different":[97],"applications":[98],"using":[100],"payload":[101],"signatures":[102],"novel":[105],"clustering":[106],"algorithm":[107],"then":[109],"analyze":[110],"specific":[112],"application":[114],"community":[115],"based":[116],"temporal-frequent":[119],"characteristics":[120],"flows":[122,150,171,176],"that":[123],"leads":[124],"differentiation":[126],"malicious":[128],"channels":[130],"created":[131],"bots":[133],"from":[134,172],"normal":[135],"generated":[138],"human":[140],"beings.":[141],"We":[142],"evaluate":[143],"our":[144],"with":[146,177],"over":[147,152,173],"160":[148,174],"million":[149,175],"collected":[151],"five":[153],"consecutive":[154],"days":[155],"large":[158],"scale":[159],"results":[162],"show":[163],"proposed":[165],"successfully":[167],"detects":[168],"high":[179],"rate":[181],"an":[183],"acceptable":[184],"low":[185],"false":[186],"alarm":[187],"rate.":[188]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2108005341","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2024-12-22T00:28:40.243206","created_date":"2016-06-24"}