{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T04:13:54Z","timestamp":1743394434955,"version":"3.40.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T00:00:00Z","timestamp":1739836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T00:00:00Z","timestamp":1739836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100009523","name":"Funda\u00e7\u00e3o para o Desenvolvimento da UNESP","doi-asserted-by":"publisher","award":["2764\/2018","2764\/2018"],"award-info":[{"award-number":["2764\/2018","2764\/2018"]}],"id":[{"id":"10.13039\/501100009523","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s10207-025-00996-3","type":"journal-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T14:16:45Z","timestamp":1739888205000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semi-supervised approach for detecting malicious domains in TLDs in their first query"],"prefix":"10.1007","volume":"24","author":[{"given":"Marcos Rog\u00e9rio","family":"Silveira","sequence":"first","affiliation":[]},{"given":"Adriano Mauro","family":"Cansian","sequence":"additional","affiliation":[]},{"given":"Hugo Koji","family":"Kobayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"key":"996_CR1","doi-asserted-by":"crossref","unstructured":"Harrenstien, K., Stahl, M., Feinler, E.: DoD internet host table specification, RFC 952, Oct (1985) [Online]. Available: https:\/\/rfc-editor.org\/rfc\/rfc952.txt","DOI":"10.17487\/rfc0952"},{"key":"996_CR2","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain names\u2014concepts and facilities, RFC 1034, Nov 1987","DOI":"10.17487\/rfc1034"},{"key":"996_CR3","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.:Domain names\u2014implementation and specification, RFC 1035, Nov 1987","DOI":"10.17487\/rfc1035"},{"key":"996_CR4","unstructured":"Stat, D.N.: The overall number of domains registered, by tld type, https:\/\/domainnamestat.com\/statistics\/overview, (2024). Accessed on 14 Feb 2024"},{"key":"996_CR5","doi-asserted-by":"crossref","unstructured":"Vissers, T., Spooren, J., Agten, P., Jumpertz, D., Janssen, P., Van Wesemael, M., Piessens, F., Joosen, W., Desmet, L.: Exploring the ecosystem of malicious domain registrations in the. eu TLD. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10453, pp. 472\u2013493. LNCS (2017)","DOI":"10.1007\/978-3-319-66332-6_21"},{"key":"996_CR6","doi-asserted-by":"crossref","unstructured":"Kidmose, E., Lansing, E., Brandbyge, S., Pedersen, J.M.: Detection of malicious and abusive domain names. In: Proceedings\u20142018 1st International Conference on Data Intelligence and Security, ICDIS 2018, pp. 49\u201356. (2018)","DOI":"10.1109\/ICDIS.2018.00015"},{"key":"996_CR7","doi-asserted-by":"crossref","unstructured":"Desmet, L., Spooren, J., Vissers, T., Janssen, P., Joosen, W.: Premadoma: an operational solution to prevent malicious domain name registrations in the. Eu TLD. In: Digital Threats: Research and Practice, vol. 2, no. 1, pp. 1\u201324. (2021) [Online]. Available: https:\/\/remote-lib.ui.ac.id:2075\/10.1145\/3419476","DOI":"10.1145\/3419476"},{"key":"996_CR8","doi-asserted-by":"crossref","unstructured":"Kountouras, A., Kintis, P., Lever, C., Chen, Y., Nadji, Y., Dagon, D., Antonakakis, M., Joffe, R.: Enabling network security through active dns datasets. In: International Symposium on Research in Attacks, Intrusions, and Defenses, pp. 188\u2013208. Springer (2016)","DOI":"10.1007\/978-3-319-45719-2_9"},{"key":"996_CR9","doi-asserted-by":"crossref","unstructured":"Silveira, M.R., da Silva, L.M., Cansian, A.M., Kobayashi, H.K.: Detection of newly registered malicious domains through passive DNS, pp. 3360\u20133369, (2022) [Online]. Available: https:\/\/ieeexplore.ieee.org\/document\/9671348","DOI":"10.1109\/BigData52589.2021.9671348"},{"key":"996_CR10","unstructured":"Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou, N., Dagon, D.: Detecting malware domains at the upper DNS hierarchy, In: Proceedings of the 20th USENIX Security Symposium, pp. 411\u2013426. (2011)"},{"key":"996_CR11","unstructured":"Lynn, M.S.: A unique, authoritative root for the DNS. The Internet Protocol Journal, vol. 4, no. 3, (2001). [Online]. Available: https:\/\/www.icann.org\/resources\/pages\/unique-authoritative-root-2012-02-25-en"},{"key":"996_CR12","volume-title":"TCP\/IP illustrated vol. 1: the protocols","author":"KR Fall","year":"2011","unstructured":"Fall, K.R., Stevens, W.R.: TCP\/IP illustrated vol. 1: the protocols. Addison-Wesley (2011)"},{"key":"996_CR13","unstructured":"Weimer, F.: Passive DNS replication. In: FIRST conference on computer security incident, Vol. 98, pp. 1\u201314. (2005)"},{"key":"996_CR14","unstructured":"Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for DNS. In: Proceedings of the 19th USENIX Security Symposium, pp. 273\u2013289. (2010)"},{"key":"996_CR15","unstructured":"Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M., Antipolis, S.: EXPOSURE: finding malicious domains using passive DNS analysis. In: Ndss, pp. 1\u201317. (2011)"},{"key":"996_CR16","doi-asserted-by":"crossref","unstructured":"Lison, P., Mavroeidis, V.: Neural reputation models learned from passive DNS data. In: Proceedings\u20142017 IEEE International Conference on Big Data, Big Data 2017, vol. 2018, pp. 3662\u20133671. (2017)","DOI":"10.1109\/BigData.2017.8258361"},{"key":"996_CR17","doi-asserted-by":"crossref","unstructured":"Weber, M., Wang, J., Zhou, Y.: Unsupervised clustering for identification of malicious domain campaigns. In: Proceedings of the First Workshop on Radical and Experiential Security, pp. 33\u201339. (2018)","DOI":"10.1145\/3203422.3203423"},{"key":"996_CR18","doi-asserted-by":"crossref","unstructured":"Bao, Z., Wang, W., Lan, Y.: Using passive DNS to detect malicious domain name. In: ACM International Conference Proceeding Series, (2019). [Online]. Available: https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3387168.3387236","DOI":"10.1145\/3387168.3387236"},{"key":"996_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Q., Li, L., Jiang, B., Lu, Z., Liu, J., Jian, S.: Malicious Domain Detection Based on K-means and SMOTE. pp. 468\u2013481. Springer, Cham (2020) [Online]. Available: http:\/\/link.springer.com\/10.1007\/978-3-030-50417-5_35","DOI":"10.1007\/978-3-030-50417-5_35"},{"key":"996_CR20","doi-asserted-by":"crossref","unstructured":"Silveira, M.R., da Silva, L.M., Cansian, A.M., Kobayashi, H.K.: Xgboost applied to identify malicious domains using passive DNS. In: IEEE 19th International Symposium on Network Computing and Applications (NCA), pp. 1\u20134. IEEE (2020)","DOI":"10.1109\/NCA51143.2020.9306704"},{"key":"996_CR21","doi-asserted-by":"crossref","unstructured":"Darwish, S.M., Anber, A.E., Mesbah, S.: Bio-inspired machine learning mechanism for detecting malicious url through passive DNS in big data platform. In: Machine Learning and Big Data Analytics Paradigms: Analysis, Applications and Challenges, pp. 147\u2013161. Springer (2021)","DOI":"10.1007\/978-3-030-59338-4_9"},{"key":"996_CR22","doi-asserted-by":"crossref","unstructured":"Gao, Y., Yuan, F., Yang, J., Wang, D., Cao, C., Liu, Y.: Semi-supervised malicious domain detection based on meta pseudo labeling. In: International Conference on Computational Science, pp. 312\u2013324. Springer (2024)","DOI":"10.1007\/978-3-031-63751-3_21"},{"key":"996_CR23","doi-asserted-by":"crossref","unstructured":"Wullink, M., Moura, G.C., M\u00fcller, M., Hesselman, C.: Entrada: a high-performance network traffic data streaming warehouse. In: NOMS 2016-2016 IEEE\/IFIP Network Operations and Management Symposium, pp. 913\u2013918. IEEE (2016)","DOI":"10.1109\/NOMS.2016.7502925"},{"key":"996_CR24","doi-asserted-by":"crossref","unstructured":"Naseriparsa, M., Kashani, M.M.R.: Combination of pca with smote resampling to boost the prediction rate in lung cancer dataset, (2014). arXiv preprint arXiv:1403.1949","DOI":"10.5120\/13376-0987"},{"key":"996_CR25","doi-asserted-by":"crossref","unstructured":"Garc\u00eda, V., S\u00e1nchez, J.S., Mollineda, R.A.: Classification of high dimensional and imbalanced hyperspectral imagery data. In: Iberian Conference on Pattern Recognition and Image Analysis, pp. 644\u2013651. Springer (2011)","DOI":"10.1007\/978-3-642-21257-4_80"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-00996-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-00996-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-00996-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T07:57:55Z","timestamp":1743321475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-00996-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,18]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["996"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-00996-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,2,18]]},"assertion":[{"value":"18 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare full compliance with ethical standards. This paper does not contain any studies involving humans or animals performed by any of the authors. The authors have no Conflict of interest as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"80"}}