{"id":"https://openalex.org/W3011545799","doi":"https://doi.org/10.1145/3377170.3377222","title":"An IoT Botnet Prediction Model Using Frequency based Dependency Graph","display_name":"An IoT Botnet Prediction Model Using Frequency based Dependency Graph","publication_year":2019,"publication_date":"2019-12-20","ids":{"openalex":"https://openalex.org/W3011545799","doi":"https://doi.org/10.1145/3377170.3377222","mag":"3011545799"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377170.3377222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048149984","display_name":"Warusia Yassin","orcid":"https://orcid.org/0000-0001-9601-2572"},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"funder","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Warusia Yassin","raw_affiliation_strings":["Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051803601","display_name":"Raihana Syahirah Abdullah","orcid":null},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"funder","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Raihana Abdullah","raw_affiliation_strings":["Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066444368","display_name":"Mohd Faizal Abdollah","orcid":"https://orcid.org/0000-0003-2706-7603"},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"funder","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Faizal Abdollah","raw_affiliation_strings":["Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052130791","display_name":"Zaki Mas'ud","orcid":null},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"funder","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Zaki Mas'ud","raw_affiliation_strings":["Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001018477","display_name":"Farah Adeliena Bakhari","orcid":null},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"funder","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Farah Adeliena Bakhari","raw_affiliation_strings":["Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka","institution_ids":["https://openalex.org/I32589535"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.393,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.686814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":null,"issue":null,"first_page":"344","last_page":"352"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9691587},{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.46162704},{"id":"https://openalex.org/keywords/dependency-graph","display_name":"Dependency graph","score":0.4493629},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.4263447}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9691587},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.86994994},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8130741},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.6406369},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.48586696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46240145},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.46162704},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.4493629},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.4263447},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.41693527},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41306275},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.40801668},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38724786},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38225833},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.18001345},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15502462},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.09805426},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377170.3377222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.58,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1775772884","https://openalex.org/W1966741850","https://openalex.org/W1974089669","https://openalex.org/W2009033060","https://openalex.org/W2079625175","https://openalex.org/W2096974968","https://openalex.org/W2126401948","https://openalex.org/W2135349594","https://openalex.org/W2261354734","https://openalex.org/W2766493169","https://openalex.org/W2799947440","https://openalex.org/W2891929340","https://openalex.org/W2915893383","https://openalex.org/W2964234547","https://openalex.org/W3122864121"],"related_works":["https://openalex.org/W4289354592","https://openalex.org/W2929621094","https://openalex.org/W2430210575","https://openalex.org/W2327631927","https://openalex.org/W2165069859","https://openalex.org/W2099112646","https://openalex.org/W2093568763","https://openalex.org/W2003096546","https://openalex.org/W1996006176","https://openalex.org/W1985166372"],"abstract_inverted_index":{"Malware":[0],"attacks":[1],"are":[2,79],"widespread":[3],"in":[4,45,65,81,104,180],"an":[5],"era":[6],"of":[7,16,32,39,49,55,69,109,138,146,154,174,203,224],"growing":[8],"technology":[9,18,41],"by":[10,85,116],"targeting":[11],"most":[12],"computing":[13],"resources.":[14],"Plenty":[15],"the":[17,30,63,93,96,126,133,144,186,195,201],"nowadays":[19],"is":[20,122],"based":[21],"on":[22],"digital":[23],"data":[24],"exchange":[25],"and":[26,135,164,184],"it":[27],"leads":[28],"to":[29,62,92,101,142,182,216],"Internet":[31],"Things":[33],"(IoT)":[34],"development.":[35],"A":[36,172],"massive":[37],"growth":[38],"IoT":[40,50,74,117,205],"attracts":[42],"attackers'":[43],"interest":[44],"exploiting":[46],"a":[47,53,67,130,152,157,178],"number":[48],"devices":[51],"using":[52,125],"variety":[54],"attacks.":[56],"Consequently,":[57],"this":[58,105,209,211],"has":[59],"caused":[60],"difficulty":[61],"researcher":[64],"distinguishing":[66],"characteristic":[68,149],"such":[70,83],"variant":[71,148,223],"specifically":[72],"for":[73,168,221],"botnet-based":[75],"attack.":[76],"Current":[77],"approaches":[78],"weak":[80],"recognizing":[82],"behavior":[84],"analyzing":[86],"registry":[87,111],"information":[88,112],"more":[89],"accurately":[90],"due":[91],"fact":[94],"that":[95,194],"attack":[97,159,188],"pattern":[98,137,160],"usually":[99],"hard":[100],"construct.":[102],"Hence,":[103],"paper,":[106],"selected":[107],"features":[108],"suspicious":[110],"that's":[113],"been":[114],"affected":[115],"botnet":[118,140,170,206],"action":[119],"i.e.":[120],"Mirai":[121],"further":[123],"analyzed":[124],"graph-theoretical":[127],"approach.":[128],"Using":[129],"dependency":[131],"graph,":[132],"similar":[134],"dissimilar":[136],"distinct":[139],"composed":[141],"facilitate":[143],"process":[145],"malware":[147],"identification.":[150],"As":[151],"result":[153],"doing":[155],"this,":[156],"precise":[158],"can":[161],"be":[162,166,214],"constructed":[163],"could":[165,199,213],"considered":[167],"future":[169],"prediction.":[171],"series":[173],"experiments":[175],"conducted":[176],"as":[177],"proof-of-concept":[179],"order":[181],"assess":[183],"validate":[185],"formed":[187],"pattern.":[189],"The":[190],"findings":[191],"have":[192],"shown":[193],"proposed":[196],"prediction":[197],"model":[198,212],"overcome":[200],"issues":[202],"undetectable":[204],"behavior.":[207],"From":[208],"forward,":[210],"used":[215],"obtain":[217],"accurate":[218],"detection":[219],"results":[220],"any":[222],"malware.":[225]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3011545799","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-02-23T03:08:49.333694","created_date":"2020-03-23"}