{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:51Z","timestamp":1761402051193},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030369378"},{"type":"electronic","value":"9783030369385"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36938-5_32","type":"book-chapter","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:04:11Z","timestamp":1575936251000},"page":"520-535","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration"],"prefix":"10.1007","author":[{"given":"Jiacheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Aiello, M., Mongelli, M., Papaleo, G.: Basic classifiers for DNS tunneling detection. In: 2013 IEEE Symposium on Computers and Communications, ISCC 2013, Split, Croatia, 7\u201310 July 2013, pp. 880\u2013885 (2013)","DOI":"10.1109\/ISCC.2013.6755060"},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"6137098:1","DOI":"10.1155\/2018\/6137098","volume":"2018","author":"A Almusawi","year":"2018","unstructured":"Almusawi, A., Amintoosi, H.: DNS tunneling detection method based on multilabel support vector machine. Secur. Commun. Netw. 2018, 6137098:1\u20136137098:9 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"32_CR3","unstructured":"Born, K., Gustafson, D.: Detecting DNS tunnels using character frequency analysis. CoRR abs\/1004.4358 (2010)"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Born, K., Gustafson, D.: NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis. In: Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, 21\u201323 April 2010, p. 47 (2010)","DOI":"10.1145\/1852666.1852718"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-030-00470-5_7","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"J Bushart","year":"2018","unstructured":"Bushart, J., Rossow, C.: DNS unchained: amplified application-layer DoS attacks against DNS authoritatives. In: Bailey, M., Holz, T., Stamatogiannakis, M., Ioannidis, S. (eds.) RAID 2018. LNCS, vol. 11050, pp. 139\u2013160. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00470-5_7"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Cho, K., van Merrienboer, B., Bahdanau, D., Bengio, Y.: On the properties of neural machine translation: encoder-decoder approaches. In: Proceedings of SSST@EMNLP 2014, Eighth Workshop on Syntax, Semantics and Structure in Statistical Translation, Doha, Qatar, 25 October 2014, pp. 103\u2013111 (2014)","DOI":"10.3115\/v1\/W14-4012"},{"key":"32_CR7","unstructured":"Dagon, D., Antonakakis, M., Day, K., Luo, X., Lee, C.P., Lee, W.: Recursive DNS architectures and vulnerability implications. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, San Diego, California, USA, 8th February\u201311th February 2009 (2009)"},{"issue":"8","key":"32_CR8","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"32_CR9","first-page":"1","volume":"4648","author":"S Josefsson","year":"2006","unstructured":"Josefsson, S.: The base16, base32, and base64 data encodings. RFC 4648, 1\u201318 (2006)","journal-title":"RFC"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Liu, J., Li, S., Zhang, Y., Xiao, J., Chang, P., Peng, C.: Detecting DNS tunnel through binary-classification based on behavior features. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, Sydney, Australia, 1\u20134 August 2017, pp. 339\u2013346 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.256"},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2018.09.006","volume":"80","author":"A Nadler","year":"2019","unstructured":"Nadler, A., Aminov, A., Shabtai, A.: Detection of malicious and low throughput data exfiltration over the DNS protocol. Comput. Secur. 80, 36\u201353 (2019)","journal-title":"Comput. Secur."},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.procs.2013.05.109","volume":"17","author":"Cheng Qi","year":"2013","unstructured":"Qi, C., Chen, X., Xu, C., Shi, J., Liu, P.: A bigram based real time DNS tunnel detection approach. In: Proceedings of the First International Conference on Information Technology and Quantitative Management, ITQM 2013, Dushu Lake Hotel, Sushou, China, 16\u201318 May 2013, pp. 852\u2013860 (2013)","journal-title":"Procedia Computer Science"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-64701-2_9","volume-title":"Network and System Security","author":"S Shafieian","year":"2017","unstructured":"Shafieian, S., Smith, D., Zulkernine, M.: Detecting DNS tunneling using ensemble learning. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 112\u2013127. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64701-2_9"},{"issue":"4","key":"32_CR14","doi-asserted-by":"crossref","first-page":"71:1","DOI":"10.1145\/3009906","volume":"49","author":"P Wiriyathammabhum","year":"2017","unstructured":"Wiriyathammabhum, P., Summers-Stay, D., Ferm\u00fcller, C., Aloimonos, Y.: Computer vision and natural language processing: recent approaches in multimedia and robotics. ACM Comput. Surv. 49(4), 71:1\u201371:44 (2017)","journal-title":"ACM Comput. Surv."},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"69713","DOI":"10.1109\/ACCESS.2018.2880884","volume":"6","author":"X Zang","year":"2018","unstructured":"Zang, X., Gong, J., Mo, S., Jakalan, A., Ding, D.: Identifying fast-flux botnet with AGD names at the upper DNS hierarchy. IEEE Access 6, 69713\u201369727 (2018)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36938-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T05:43:15Z","timestamp":1613022195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36938-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030369378","9783030369385"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36938-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sapporo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}