{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T17:42:27Z","timestamp":1762018947169,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_37","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"905-928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection"],"prefix":"10.1007","author":[{"given":"R.","family":"Vinayakumar","sequence":"first","affiliation":[]},{"given":"K. P.","family":"Soman","sequence":"additional","affiliation":[]},{"given":"Prabaharan","family":"Poornachandran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"37_CR1","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., et al. (2016). TensorFlow: A system for large-scale machine learning. In OSDI (Vol. 16, pp. 265\u2013283)."},{"key":"37_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.4018\/978-1-5225-0105-3.ch003","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"E Alomari","year":"2016","unstructured":"Alomari, E., Manickam, S., Gupta, B. B., Anbar, M., Saad, R. M., & Alsaleem, S. (2016). A survey of botnet-based DDoS flooding attacks of application layer: Detection and mitigation approaches. In Handbook of research on modern cryptographic solutions for computer and cyber security (pp. 52\u201379). Pennsylvania, PA: IGI Global."},{"key":"37_CR3","unstructured":"Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., et al. (2012). From throw-away traffic to bots: Detecting the rise of DGA-based malware. In USENIX Security Symposium (Vol. 12)."},{"key":"37_CR4","volume-title":"Deep Learning with Keras","author":"A Gulli","year":"2017","unstructured":"Gulli, A., & Pal, S. (2017). Deep Learning with Keras. Packt Publishing Ltd."},{"key":"37_CR5","unstructured":"Curtin, R. R., Gardner, A. B., Grzonkowski, S., Kleymenov, A., & Mosquera, A. (2018). Detecting DGA domains with recurrent neural networks and side information. arXiv preprint arXiv:1810.02023."},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/ICCSCE.2012.6487169","volume-title":"2012 IEEE International Conference on Control System, Computing and Engineering (ICCSCE)","author":"M Eslahi","year":"2012","unstructured":"Eslahi, M., Salleh, R., & Anuar, N. B. (2012). Bots and botnets: An overview of characteristics, detection and challenges. In 2012 IEEE International Conference on Control System, Computing and Engineering (ICCSCE) (pp. 349\u2013354). Piscataway, NJ: IEEE."},{"key":"37_CR7","unstructured":"Feng, Z., Shuo, C., & Xiaochuan, W. (2017). Classification for DGA-based malicious domain names with deep learning architectures. In 2017 Second International Conference on Applied Mathematics and Information Technology (p. 5)."},{"key":"37_CR8","unstructured":"Freund, Y., & Schapire, R. E. (1996). Experiments with a new boosting algorithm. In ICML (Vol. 96, pp. 148\u2013156)."},{"issue":"9","key":"37_CR9","first-page":"1263","volume":"21","author":"H He","year":"2008","unstructured":"He, H., & Garcia, E. A. (2008). Learning from imbalanced data. IEEE Transactions on Knowledge & Data Engineering, 21(9), 1263\u20131284.","journal-title":"IEEE Transactions on Knowledge & Data Engineering"},{"key":"37_CR10","first-page":"1","volume-title":"2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"S Krishnan","year":"2013","unstructured":"Krishnan, S., Taylor, T., Monrose, F., & McHugh, J. (2013). Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing. In 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 1\u201312). Piscataway, NJ: IEEE."},{"key":"37_CR11","first-page":"1","volume-title":"International Workshop on Recent Advances in Intrusion Detection","author":"M K\u00fchrer","year":"2014","unstructured":"K\u00fchrer, M., Rossow, C., & Holz, T. (2014). Paint it black: Evaluating the effectiveness of malware blacklists. In International Workshop on Recent Advances in Intrusion Detection (pp. 1\u201321). Cham: Springer."},{"key":"37_CR12","unstructured":"Kukar, M., & Kononenko, I. (1998). Cost-sensitive learning with neural networks. In ECAI (pp. 445\u2013449)."},{"issue":"7553","key":"37_CR13","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436.","journal-title":"Nature"},{"key":"37_CR14","unstructured":"Lison, P., & Mavroeidis, V. (2017). Automatic detection of malware-generated domains with recurrent neural models. arXiv preprint arXiv:1709.07102."},{"key":"37_CR15","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/3155133.3155166","volume-title":"Proceedings of the Eighth International Symposium on Information and Communication Technology","author":"H Mac","year":"2017","unstructured":"Mac, H., Tran, D., Tong, V., Nguyen, L. G., & Tran, H. A. (2017). DGA botnet detection using supervised learning methods. In Proceedings of the Eighth International Symposium on Information and Communication Technology (pp. 211\u2013218). New York, NY: ACM."},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/SPW.2018.00041","volume-title":"2018 IEEE Security and Privacy Workshops (SPW)","author":"V S Mohan","year":"2018","unstructured":"Mohan, V. S., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018). Spoof net: Syntactic patterns for identification of ominous online factors. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 258\u2013263). Piscataway, NJ: IEEE."},{"key":"37_CR17","unstructured":"Plohmann, D., Yakdan, K., Klatt, M., Bader, J., & Gerhards-Padilla, E. (2016). A comprehensive measurement study of domain generating malware. In USENIX Security Symposium (pp. 263\u2013278)."},{"key":"37_CR18","first-page":"1","volume-title":"2015 International Joint Conference on Neural Networks (IJCNN)","author":"C Qiu","year":"2015","unstructured":"Qiu, C., Jiang, L., & Kong, G. (2015). A differential evolution-based method for class-imbalanced cost-sensitive learning. In 2015 International Joint Conference on Neural Networks (IJCNN) (pp. 1\u20138). Piscataway, NJ: IEEE."},{"key":"37_CR19","first-page":"192","volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","author":"S Schiavoni","year":"2014","unstructured":"Schiavoni, S., Maggi, F., Cavallaro, L., & Zanero, S. (2014). Phoenix: DGA-based botnet tracking and intelligence. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 192\u2013211). Cham: Springer."},{"key":"37_CR20","unstructured":"Sch\u00fcppen, S., Teubert, D., Herrmann, P., & Meyer, U. (2018). FANCI: Feature-based automated NXDomain classification and intelligence. In 27th USENIX Security Symposium (USENIX Security 18) (pp. 1165\u20131181)."},{"issue":"1","key":"37_CR21","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TSMCA.2009.2029559","volume":"40","author":"C Seiffert","year":"2010","unstructured":"Seiffert, C., Khoshgoftaar, T. M., Van Hulse, J., & Napolitano, A. (2010). RUSBoost: A hybrid approach to alleviating class imbalance. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, 40(1), 185\u2013197.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans"},{"key":"37_CR22","doi-asserted-by":"publisher","first-page":"5058","DOI":"10.1109\/BigData.2018.8621875","volume-title":"2018 IEEE International Conference on Big Data (Big Data)","author":"R Sivaguru","year":"2018","unstructured":"Sivaguru, R., Choudhary, C., Yu, B., Tymchenko, V., Nascimento, A., & De Cock, M. (2018). An evaluation of DGA classifiers. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 5058\u20135067). Piscataway, NJ: IEEE."},{"issue":"1","key":"37_CR23","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MSP.2010.144","volume":"9","author":"B Stone-Gross","year":"2011","unstructured":"Stone-Gross, B., Cova, M., Gilbert, B., Kemmerer, R., Kruegel, C., & Vigna, G. (2011). Analysis of a botnet takeover. IEEE Security & Privacy, 9(1), 64\u201372.","journal-title":"IEEE Security & Privacy"},{"key":"37_CR24","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1016\/j.neucom.2017.11.018","volume":"275","author":"D Tran","year":"2018","unstructured":"Tran, D., Mac, H., Tong, V., Tran, H. A., & Nguyen, L. G. (2018). A LSTM based framework for handling multiclass imbalance in DGA botnet detection. Neurocomputing, 275, 2401\u20132413.","journal-title":"Neurocomputing"},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Barathi Ganesh, H. B., & Anand Kumar, M., Soman, K. P. DeepAnti-PhishNet: Applying deep neural networks for phishing email detection cen-aisecurity@iwspa-2018 (pp. 40\u201350). http:\/\/ceur-ws.org\/Vol2124\/#paper_9","DOI":"10.1007\/978-3-319-73606-8_4"},{"key":"37_CR26","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-981-10-8476-8_6","volume-title":"Big Data in Engineering Applications","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Poornachandran, P., & Soman, K. P. (2018). Scalable framework for cyber threat situational awareness based on domain name systems data analysis. In Big Data in Engineering Applications (pp. 113\u2013142). Singapore: Springer."},{"key":"37_CR27","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., & Soman, K. P. (2018). DeepMalNet: Evaluating shallow and deep networks for static PE malware detection. ICT Express, 4(4), 255\u2013258.","DOI":"10.1016\/j.icte.2018.10.006"},{"key":"37_CR28","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1109\/ICACCI.2017.8126009","volume-title":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","author":"R Vinayakumar","year":"2017","unstructured":"Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222\u20131228). Piscataway, NJ: IEEE."},{"key":"37_CR29","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1109\/ICACCI.2017.8126018","volume-title":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","author":"R Vinayakumar","year":"2017","unstructured":"Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Evaluating effectiveness of shallow and deep networks to intrusion detection system. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1282\u20131289). Piscataway, NJ: IEEE."},{"issue":"3","key":"37_CR30","doi-asserted-by":"publisher","first-page":"43","DOI":"10.4018\/IJISMD.2017070103","volume":"8","author":"R Vinayakumar","year":"2017","unstructured":"Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Evaluation of recurrent neural network and its variants for intrusion detection system (IDS). International Journal of Information System Modeling and Design, 8(3), 43\u201363.","journal-title":"International Journal of Information System Modeling and Design"},{"key":"37_CR31","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/ICACCI.2017.8125846","volume-title":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","author":"R Vinayakumar","year":"2017","unstructured":"Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Long short-term memory based operation log anomaly detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 236\u2013242). Piscataway, NJ: IEEE."},{"key":"37_CR32","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1109\/ICACCI.2017.8126143","volume-title":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","author":"R Vinayakumar","year":"2017","unstructured":"Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Secure shell (SSH) traffic analysis with flow based features using shallow and deep networks. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 2026\u20132032). Piscataway, NJ: IEEE."},{"issue":"3","key":"37_CR33","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.3233\/JIFS-169431","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018). Detecting malicious domain names using deep learning approaches at scale. Journal of Intelligent & Fuzzy Systems, 34(3), 1355\u20131367.","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"3","key":"37_CR34","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3233\/JIFS-169429","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018). Evaluating deep learning approaches to characterize, signalize and classify malicious URLs. Journal of Intelligent and Fuzzy Systems, 34(3), 1333\u20131343.","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"37_CR35","unstructured":"Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M., & Jolfaei, A. (in press). Detecting domain generation algorithms using deep learning. In Deep learning applications for cyber security. Cham: Springer."},{"key":"37_CR36","unstructured":"Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M., & Thampi, S. M. (in press). AmritaDGA: A comprehensive data set for domain generation algorithms (DGAs). In Big Data Recommender Systems: Recent Trends and Advances, Institution of Engineering and Technology (IET)."},{"key":"37_CR37","unstructured":"Vinayakumar, R., Soman, K. P., Poornachandran, P., & Menon, P. (2019). A deep-dive on machine learning for cyber security use cases. In: Machine Learning for computer and cyber security: Principle, algorithms, and practices. Boca Raton, FL: CRC Press."},{"issue":"2","key":"37_CR38","doi-asserted-by":"publisher","first-page":"189","DOI":"10.13052\/jcsm2245-1439.823","volume":"8","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Soman, K. P., Poornachandran, P., Mohan, V. S., & Kumar, A. D. (2019). ScaleNet: Scalable and hybrid framework for cyber threat situational awareness based on DNS, URL, and email data analysis. Journal of Cyber Security and Mobility, 8(2), 189\u2013240.","journal-title":"Journal of Cyber Security and Mobility"},{"issue":"3","key":"37_CR39","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.3233\/JIFS-169424","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K. P., Poornachandran, P., & Sachin Kumar, S. (2018). Detecting Android malware using long short-term memory (LSTM). Journal of Intelligent & Fuzzy Systems, 34(3), 1277\u20131288.","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"3","key":"37_CR40","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.3233\/JIFS-169423","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K. P., Poornachandran, P., & Sachin Kumar, S. (2018). Evaluating deep learning approaches to characterize and classify the DGAs at scale. Journal of Intelligent & Fuzzy Systems, 34(3), 1265\u20131276.","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"4","key":"37_CR41","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1109\/TSMCB.2012.2187280","volume":"42","author":"S Wang","year":"2012","unstructured":"Wang, S., & Yao, X. (2012). Multiclass imbalance problems: Analysis and potential solutions. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 42(4), 1119\u20131130.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"37_CR42","unstructured":"Woodbridge, J., Anderson, H. S., Ahuja, A., & Grant, D. (2016). Predicting domain generation algorithms with long short-term memory networks. arXiv preprint arXiv:1611.00791."},{"key":"37_CR43","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/1879141.1879148","volume-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement","author":"S Yadav","year":"2010","unstructured":"Yadav, S., Reddy, A. K. K., Reddy, A. L., & Ranjan, S. (2010). Detecting algorithmically generated malicious domain names. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (pp. 48\u201361). New York, NY: ACM."},{"issue":"5","key":"37_CR44","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TNET.2012.2184552","volume":"20","author":"S Yadav","year":"2012","unstructured":"Yadav, S., Reddy, A. K. K., Reddy, A. N., & Ranjan, S. (2012). Detecting algorithmically generated domain-flux attacks with DNS traffic analysis. IEEE\/ACM Transactions on Networking, 20(5), 1663\u20131677.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"37_CR45","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/ICDMW.2017.96","volume-title":"2017 IEEE International Conference on Data Mining Workshops (ICDMW)","author":"B Yu","year":"2017","unstructured":"Yu, B., Gray, D. L., Pan, J., De Cock, M., & Nascimento, A. C. (2017). Inline DGA detection with deep networks. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 683\u2013692). Piscataway, NJ: IEEE."},{"key":"37_CR46","first-page":"1","volume-title":"2018 International Joint Conference on Neural Networks (IJCNN)","author":"B Yu","year":"2018","unstructured":"Yu, B., Pan, J., Hu, J., Nascimento, A., & De Cock, M. (2018). Character level based detection of DGA domain names. In 2018 International Joint Conference on Neural Networks (IJCNN) (pp. 1\u20138). Piscataway, NJ: IEEE."},{"issue":"4","key":"37_CR47","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/3191329","volume":"51","author":"Y Zhauniarovich","year":"2018","unstructured":"Zhauniarovich, Y., Khalil, I., Yu, T., & Dacier, M. (2018). A Survey on malicious domains detection through DNS data analysis. ACM Computing Surveys, 51(4), 67","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"37_CR48","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TKDE.2006.17","volume":"18","author":"Z H Zhou","year":"2006","unstructured":"Zhou, Z. H., & Liu, X. Y. (2006). Training cost-sensitive neural networks with methods addressing the class imbalance problem. IEEE Transactions on Knowledge and Data Engineering, 18(1), 63\u201377.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"37_CR49","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1111\/j.1467-8640.2010.00358.x","volume":"26","author":"Z H Zhou","year":"2010","unstructured":"Zhou, Z. H., & Liu, X. Y. (2010). On multi-class cost-sensitive learning. Computational Intelligence, 26(3), 232\u2013257.","journal-title":"Computational Intelligence"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T15:40:16Z","timestamp":1613317216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_37","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}