{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T01:20:52Z","timestamp":1770513652120,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-021-10765-8","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T19:02:45Z","timestamp":1617303765000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Botnet traffic identification using neural networks"],"prefix":"10.1007","author":[{"given":"Rajib","family":"Biswas","sequence":"first","affiliation":[]},{"given":"Sambuddha","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"10765_CR1","unstructured":"Alomari E, Manickam S, Gupta B, Singh P, Anbar M (2014) Design, deployment and use of http-based botnet (hbb) testbed; 16th IEEE International Conference on Advanced Communication Technology (ICACT), South Korea, pp. 1265\u20131269"},{"key":"10765_CR2","unstructured":"Apthorpe N, Reisman D, Feamster NA (2017) A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. CoRR, abs\/1705.06805"},{"key":"10765_CR3","doi-asserted-by":"crossref","unstructured":"Bartlett G, Heidemann J, Papadopoulos C (2007) Understanding passive and active service discovery (extended); Tech rep. Technical Report ISI-TR- 2007\u2013642, USC\/Information Sciences Institute","DOI":"10.1145\/1298306.1298314"},{"key":"10765_CR4","unstructured":"Bot-iot (2018). URLhttps:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/bot_iot.php"},{"key":"10765_CR5","unstructured":"Caberera J, Ravichandran B, Mehra R (2000) Statistical traffic modeling for network intrusion detection; Proceedings of the 8th International Symposium on Modeling , Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728); , pp 466\u2013473"},{"key":"10765_CR6","doi-asserted-by":"crossref","unstructured":"Cho K, Merrienboer BV, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using RNN encoder-decoder for statistical machine translation; Proc Conference on Empirical Methods in Natural Language Processing 1724\u20131734","DOI":"10.3115\/v1\/D14-1179"},{"key":"10765_CR7","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1007\/s13042-018-0834-5","volume":"9","author":"L Cui","year":"2018","unstructured":"Cui L, Yang S, Chen F (2018) A survey on application of machine learning for internet of things. Int J Mach Learn Cybern 9:1399\u20131417. https:\/\/doi.org\/10.1007\/s13042-018-0834-5","journal-title":"Int J Mach Learn Cybern"},{"key":"10765_CR8","unstructured":"Delgado MF, Cernadas E, Barro S, Amorim DG Do we need hundreds of classifiers to solve real world classification problems? J Mach Learn Res 15(1):3133\u20133181"},{"key":"10765_CR9","doi-asserted-by":"publisher","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine Learning DDoS Detection for Consumer Internet of Things Devices; IEEE security and privacy workshops (SPW). San Francisco, CA, 2018, pp. 29\u201335. https:\/\/doi.org\/10.1109\/SPW.2018.00013.","DOI":"10.1109\/SPW.2018.00013"},{"issue":"1","key":"10765_CR10","first-page":"483","volume":"13","author":"R Hadiantol","year":"2018","unstructured":"Hadiantol R, Purboyo TW (2018) A Survey Paper on Botnet Attacks and Defenses in Software Defined Networking. Int J Appl Eng Res, ISSN 0973\u20134562 13(1):483\u2013489","journal-title":"Int J Appl Eng Res"},{"key":"10765_CR11","unstructured":"Hao S, Syed NA, Feamster N, Gray AG, Krasser S (2000) Detecting spammers with snare: Spatio-temporal networklevel automatic reputation engine; USENIX security symposium, vol. 9"},{"issue":"8","key":"10765_CR12","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput"},{"key":"10765_CR13","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.jnca.2013.08.001","volume":"40","author":"N Hoque","year":"2014","unstructured":"Hoque N, Bhuyan MH, Baishya RC, Bhattacharyya DK, Kalita JK (2014) Network attacks: taxonomy, tools and systems. J Netw Comput Appl 40:307\u2013324","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"10765_CR14","first-page":"71","volume":"5","author":"A Jesudoss","year":"2014","unstructured":"Jesudoss A, Subramaniam N (2014) A survey on authentication attacks and counter- measures in a distributed environment. Indian J Comput Sci Eng (IJCSE) 5(2):71\u201377 ISSN : 0976\u20135166","journal-title":"Indian J Comput Sci Eng (IJCSE)"},{"issue":"7","key":"10765_CR15","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DFoS in the IoT: Mirai and other botnets. IEEE Computer 50(7):80\u201384 ISSN 0018-9162","journal-title":"IEEE Computer"},{"key":"10765_CR16","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2018) Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset; https:\/\/arxiv.org\/abs\/1811.00701"},{"key":"10765_CR17","unstructured":"Revathi S, Malathi A (2013) A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection; 2013; Int J Eng Res Technol, Volume 02, Issue 12"},{"key":"10765_CR18","unstructured":"Samani EBB, Hadian HJ, Stakhanova N, Ghorbani AA (2014) Towards effective feature selection in machine learning-based botnet detection approaches, IEEE Conference on Communications and Network Security (CNS) - San Francisco, CA, USA, pp 247\u2013255"},{"key":"#cr-split#-10765_CR19.1","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari A, Ghorbani A (2018) Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.","DOI":"10.5220\/0006639801080116"},{"key":"#cr-split#-10765_CR19.2","unstructured":"Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), pp.108-116, ISBN: 978-989-758-282-0"},{"key":"10765_CR20","doi-asserted-by":"crossref","unstructured":"Shiravi A, Shirazi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357\u2013374","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"10765_CR21","doi-asserted-by":"publisher","unstructured":"Sivanathan A, Sherratt D, Gharakheili HH, Sivaraman V, Vishwanath A (2016) Low-cost flow-based security solutions for smart-home IoT devices; 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bangalore, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ANTS.2016.7947781.","DOI":"10.1109\/ANTS.2016.7947781"},{"key":"10765_CR22","unstructured":"Soni D, Makwana A (2017) A survey on mqtt: A protocol of internet of things (iot); Proceedings of the International Conference On Telecommunication, Power Analysis And Computing Techniques (ICTPACT-2017); Chennai, India. 6\u20138 April 2017"},{"key":"10765_CR23","unstructured":"Srivastava T (2014) How does artificial neural network (ANN) algorithm work? Simplified!; OCTOBER 20. https:\/\/www.analyticsvidhya.com\/blog\/2014\/10\/ann-work-simplified\/"},{"key":"10765_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","volume":"8","author":"C Tankard","year":"2011","unstructured":"Tankard C (2011) Advanced persistent threats and how to monitor and deter them. Netw Secur 8:16\u201319","journal-title":"Netw Secur"},{"key":"10765_CR25","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A Detailed Analysis of the KDD CUP 99 Data Set\u201d; Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009 IEEE symposium on computational intelligence for security and defense applications, Ottawa, ON, pp. 1\u20136, doi: https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"10765_CR26","unstructured":"Thomas R, Pavithran D (2018) A Survey of Intrusion Detection Models based on NSL-KDD Data Set; 2018 Fifth HCT Information Technology Trends (ITT), pp.286\u2013291"},{"key":"10765_CR27","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s13042-020-01096-5","volume":"11","author":"X Wang","year":"2020","unstructured":"Wang X, Zhao Y, Pourpanah F (2020) Recent advances in deep learning. Int J Mach Learn & Cyber 11:747\u2013750. https:\/\/doi.org\/10.1007\/s13042-020-01096-5","journal-title":"Int J Mach Learn & Cyber"},{"key":"10765_CR28","doi-asserted-by":"publisher","unstructured":"Yuan X-Y., Li C., Li X (2017) DeepDefense: Identifying DDoS attack via deep learning\"; IEEE international conference on smart computing (SMARTCOMP), Hong Kong, China, pp. 1\u20138, doi: https:\/\/doi.org\/10.1109\/SMARTCOMP.2017.7946998.","DOI":"10.1109\/SMARTCOMP.2017.7946998"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10765-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-021-10765-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10765-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T19:10:36Z","timestamp":1617304236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-021-10765-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,1]]},"references-count":29,"alternative-id":["10765"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10765-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,1]]},"assertion":[{"value":"17 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}