{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:48:14Z","timestamp":1743133694953,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_55","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"695-706","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting DGA Using Deep Neural Networks (DNNs)"],"prefix":"10.1007","author":[{"given":"P. V.","family":"Jyothsna","sequence":"first","affiliation":[]},{"given":"Greeshma","family":"Prabha","sequence":"additional","affiliation":[]},{"given":"K. K.","family":"Shahina","sequence":"additional","affiliation":[]},{"given":"Anu","family":"Vazhayil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"55_CR1","unstructured":"Anonymous authors: Character level based detection of DGA domain names. Under review as a conference paper at ICLR (2018)"},{"key":"55_CR2","doi-asserted-by":"publisher","unstructured":"Bisio, F., Saeli, S., Lombardo, P., Bernardi, D., Perotti, A., Massa, D.: Real-time behavioural DGA detection through machine learning. In: 2017 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20136. Madrid (2017). \n                  https:\/\/doi.org\/10.1109\/CCST.2017.8167790","DOI":"10.1109\/CCST.2017.8167790"},{"key":"55_CR3","doi-asserted-by":"publisher","unstructured":"Yu, B., Gray, D.L., Pan, J., Cock, M.D., Nascimento, A.C.A.: Inline DGA detection with deep networks. In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 683\u2013692. New Orleans, LA (2017). \n                  https:\/\/doi.org\/10.1109\/ICDMW.2017.96","DOI":"10.1109\/ICDMW.2017.96"},{"key":"55_CR4","unstructured":"Lison, P., Mavroeidis, V.: Automatic detection of malware-generated domains with recurrent neural models. In: NISK 2017 (2017). \n                  arXiv:1709.07102\n                  \n                 [cs.CR]"},{"issue":"3","key":"55_CR5","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.3233\/JIFS-169431","volume":"34","author":"R. Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K.P., Poornachandran, P.: Detecting malicious domain names using deep learning approaches at scale. J. Intell. Fuzzy Syst. 34(3), 1355\u20131367 (2018)","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Mac, H., Tran, D., Tong, V.: DGA botnet detection using supervised learning methods. In: SoICT 2017 Proceedings of the Eighth International Symposium on Information and Communication Technology, pp. 211\u2013218","DOI":"10.1145\/3155133.3155166"},{"key":"55_CR7","unstructured":"Woodbridge, J., Anderson, H.S., Ahuja, A., Grant, D.: Predicting domain generation algorithms with long short-term memory networks (2016). \n                  arXiv:1611.00791\n                  \n                 [cs.CR]"},{"issue":"1","key":"55_CR8","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1109\/TWC.2016.2627045","volume":"16","author":"Yirui Cong","year":"2017","unstructured":"Cong, Y., Zhou, X., Kennedy, R.A.: Finite-horizon throughput region for wireless multi-user interference channels. IEEE Trans. Wireless Commun. 16(1), 634\u2013646 (2017)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"55_CR9","unstructured":"Highnam, K., Puzio, D.: Deep learning for real-time malware detection, ACSC2018"},{"key":"55_CR10","unstructured":"Glorot, X., Bordes, A., Bengio, Y.: Deep sparse rectifier neural networks. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pp. 315\u2013323, June 2011"},{"key":"55_CR11","unstructured":"Maas, A.L., Hannun, A.Y., Ng, A.Y.: Rectifier nonlinearities improve neural network acoustic models. In: Proceedings of ICML, vol. 30, no. 1 (2013)"},{"key":"55_CR12","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 807\u2013814 (2010)"},{"key":"55_CR13","unstructured":"https:\/\/github.com\/baderj\/domain_generation_algorithms"},{"key":"55_CR14","unstructured":"http:\/\/osint.bambenekconsulting.com\/feeds\/"},{"key":"55_CR15","unstructured":"https:\/\/data.netlab.360.com\/"},{"key":"55_CR16","unstructured":"Does Alexa have a list of its top-ranked websites? \n                  https:\/\/support.alexa.com"},{"key":"55_CR17","unstructured":"OpenDNS domain list. \n                  https:\/\/umbrella.cisco.com\/"},{"key":"55_CR18","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-981-10-8476-8_6","volume-title":"Big Data in Engineering Applications","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Poornachandran, P., Soman, K.P.: Scalable framework for cyber threat situational awareness based on domain name systems data analysis. In: Roy, S.S., Samui, P., Deo, R., Ntalampiras, S. (eds.) Big Data in Engineering Applications. SBD, vol. 44, pp. 113\u2013142. Springer, Singapore (2018). \n                  https:\/\/doi.org\/10.1007\/978-981-10-8476-8_6"},{"issue":"3","key":"55_CR19","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.3233\/JIFS-169431","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K., Poornachandran, P.: Detecting malicious domain names using deep learning approaches at scale. J. Intell. Fuzzy Syst. 34(3), 1355\u20131367 (2018)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"3","key":"55_CR20","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.3233\/JIFS-169423","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K., Poornachandran, P., SachinKumar, S.: Evaluating deep learning approaches to characterize and classify the DGAs at scale. J. Intell. Fuzzy Syst. 34(3), 1265\u20131276 (2018)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"55_CR21","unstructured":"Vinayakumar, R., Soman, K.P., Poornachandran, P., Menon, P.: A deep-dive on Machine learning for Cybersecurity use cases. In: Gupta, B., Sheng, M. (eds.) Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. CRC Press, USA (In Press)"},{"key":"55_CR22","doi-asserted-by":"crossref","unstructured":"Mohan, V.S., Vinayakumar, R., Soman, K.P., Poornachandran, P.: SPOOF net: syntactic patterns for identification of ominous online factors. In: 2017 IEEE Symposium Security and Privacy (SP), BioSTAR 2018 (In Press)","DOI":"10.1109\/SPW.2018.00041"},{"key":"55_CR23","unstructured":"Vinayakumar, R., Soman, K.P., Poornachandran, P.: BigCogNet: big data based cognitive security system for an organization. In: Alazab, M., Tang, M.J. (eds.) Deep Learning Applications for Cyber Security, Advanced Sciences and Technologies for Security Applications. Springer, Heidelberg (under-review)"},{"key":"55_CR24","unstructured":"https:\/\/github.com\/vinayakumarr\/DMD\n                  \n                 (2018)"},{"key":"55_CR25","unstructured":"Vinayakumar, R., Soman, K.P.: DGANet: applying traditional machine learning and deep learning models to detect and categorize DGA. ICT Expr. (2018). [under review]"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:52:40Z","timestamp":1558396360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_55","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}