{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T21:58:38Z","timestamp":1772575118380,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["No. ZR2021QF090"],"award-info":[{"award-number":["No. ZR2021QF090"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11235-023-01073-7","type":"journal-article","created":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T15:03:08Z","timestamp":1701097388000},"page":"207-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["BotDetector: a system for identifying DGA-based botnet with CNN-LSTM"],"prefix":"10.1007","volume":"85","author":[{"given":"Xiaodong","family":"Zang","sequence":"first","affiliation":[]},{"given":"Jianbo","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Xinchang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Guiqing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"1073_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.cose.2019.05.019","volume":"86","author":"M Singh","year":"2019","unstructured":"Singh, M., Singh, M., & Kaur, S. (2019). Issues and challenges in DNS based botnet detection: A survey. Computers & Security, 86, 28\u201352.","journal-title":"Computers & Security"},{"key":"1073_CR2","doi-asserted-by":"publisher","first-page":"101614","DOI":"10.1016\/j.cose.2019.101614","volume":"88","author":"C Patsakis","year":"2020","unstructured":"Patsakis, C., Casino, F., & Katos, V. (2020). Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Computers & Security, 88, 101614.","journal-title":"Computers & Security"},{"key":"1073_CR3","doi-asserted-by":"publisher","first-page":"102725","DOI":"10.1016\/j.jisa.2020.102725","volume":"58","author":"C Patsakis","year":"2021","unstructured":"Patsakis, C., & Casino, F. (2021). Exploiting statistical and structural features for the detection of domain generation algorithms. Journal of Information Security and Applications, 58, 102725.","journal-title":"Journal of Information Security and Applications"},{"key":"1073_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8887881","volume":"2021","author":"J Namgung","year":"2021","unstructured":"Namgung, J., Son, S., & Moon, Y.-S. (2021). Efficient deep learning models for DGA domain detection. Security and Communication Networks, 2021, 1\u201315.","journal-title":"Security and Communication Networks"},{"key":"1073_CR5","doi-asserted-by":"publisher","first-page":"102431","DOI":"10.1016\/j.cose.2021.102431","volume":"110","author":"B Al-Duwairi","year":"2021","unstructured":"Al-Duwairi, B., Jarrah, M., & Shatnawi, A. S. (2021). PASSVM: A highly accurate fast flux detection system. Computers & Security, 110, 102431.","journal-title":"Computers & Security"},{"key":"1073_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cose.2019.04.015","volume":"85","author":"C Xu","year":"2019","unstructured":"Xu, C., Shen, J., & Du, X. (2019). Detection method of domain names generated by DGAs based on semantic representation and deep neural network. Computers & Security, 85, 77\u201388.","journal-title":"Computers & Security"},{"issue":"2","key":"1073_CR7","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TIFS.2011.2173486","volume":"7","author":"S Shin","year":"2011","unstructured":"Shin, S., Gu, G., Reddy, N., & Lee, C. P. (2011). A large-scale empirical study of Conficker. IEEE Transactions on Information Forensics and Security, 7(2), 676\u2013690.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"1073_CR8","doi-asserted-by":"publisher","first-page":"5517","DOI":"10.1007\/s00500-018-03703-8","volume":"24","author":"M Zago","year":"2019","unstructured":"Zago, M., Gil P\u00e9rez, M., & Mart\u00ednez P\u00e9rez, G. (2019). Scalable detection of botnets based on DGA. Soft Computing, 24(8), 5517\u20135537.","journal-title":"Soft Computing"},{"issue":"6","key":"1073_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.127","volume":"3","author":"GP Akhila","year":"2020","unstructured":"Akhila, G. P., Gayathri, R., Keerthana, S., & Gladston, A. (2020). A machine learning framework for domain generating algorithm based malware detection. Security and Privacy, 3(6), e127.","journal-title":"Security and Privacy"},{"key":"1073_CR10","volume":"113","author":"AT Tong","year":"2021","unstructured":"Tong, A. T., Long, H. V., & Taniar, D. (2021). On detecting and classifying DGA botnets and their families. Computers & Security, 113, 102549.","journal-title":"Computers & Security"},{"key":"1073_CR11","doi-asserted-by":"publisher","unstructured":"Anderson, H. S., Woodbridge, J., & Filar, B. (2016). DeepDGA: Adversarially-tuned domain generation and detection. In Proceedings of the 2016 ACM workshop on artificial intelligence and security (pp. 13\u201321). New York, NY: Association for Computing Machinery. https:\/\/doi.org\/10.1145\/2996758.2996767.","DOI":"10.1145\/2996758.2996767"},{"issue":"5","key":"1073_CR12","doi-asserted-by":"publisher","first-page":"2045","DOI":"10.1016\/j.jksuci.2022.03.001","volume":"34","author":"AM Manasrah","year":"2022","unstructured":"Manasrah, A. M., Khdour, T., & Freehat, R. (2022). DGA-based botnets detection using DNS traffic mining. Journal of King Saud University\u2014Computer and Information Sciences, 34(5), 2045\u20132061.","journal-title":"Journal of King Saud University\u2014Computer and Information Sciences"},{"key":"1073_CR13","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.ins.2019.09.024","volume":"511","author":"W Wang","year":"2020","unstructured":"Wang, W., Shang, Y., He, Y., Li, Y., & Liu, J. (2020). BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Information Sciences, 511, 284\u2013296.","journal-title":"Information Sciences"},{"key":"1073_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111322","volume":"190","author":"C Ysab","year":"2022","unstructured":"Ysab, C., Kj, A., Lc, A., Gj, A., Szab, C., Yzab, C., & Dan, P. D. (2022). Online malicious domain name detection with partial labels for large-scale dependable systems. Journal of Systems and Software, 190, 111322.","journal-title":"Journal of Systems and Software"},{"key":"1073_CR15","doi-asserted-by":"publisher","first-page":"102725","DOI":"10.1016\/j.jisa.2020.102725","volume":"58","author":"C Patsakis","year":"2021","unstructured":"Patsakis, C., & Casino, F. (2021). Exploiting statistical and structural features for the detection of domain generation algorithms. Journal of Information Security and Applications, 58, 102725.","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"1073_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8887881","volume":"2021","author":"J Namgung","year":"2021","unstructured":"Namgung, J., Son, S., & Moon, Y. S. (2021). Efficient deep learning models for DGA domain detection. Security and Communication Networks, 2021(2), 1\u201315.","journal-title":"Security and Communication Networks"},{"key":"1073_CR17","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1016\/j.neucom.2017.11.018","volume":"275","author":"D Tran","year":"2017","unstructured":"Tran, D., Mac, H., Tong, V., Tran, H. A., & Nguyen, L. G. (2017). A LSTM based framework for handling multiclass imbalance in DGA botnet detection. Neurocomputing, 275, 2401\u20132413.","journal-title":"Neurocomputing"},{"key":"1073_CR18","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1109\/TIFS.2019.2960647","volume":"15","author":"X Yun","year":"2019","unstructured":"Yun, X., Huang, J., Wang, Y., Zang, T., & Zhang, Y. (2019). Khaos: An adversarial neural network DGA with high anti-detection ability. IEEE Transactions on Information Forensics and Security, 15, 2225\u20132240.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1073_CR19","doi-asserted-by":"publisher","first-page":"102803","DOI":"10.1016\/j.cose.2022.102803","volume":"120","author":"J Liang","year":"2022","unstructured":"Liang, J., Chen, S., Wei, Z., Zhao, S., & Zhao, W. (2022). HAGDetector: Heterogeneous DGA domain name detection model. Computers & Security, 120, 102803.","journal-title":"Computers & Security"},{"key":"1073_CR20","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1016\/j.comcom.2020.04.033","volume":"160","author":"M Alaeiyan","year":"2020","unstructured":"Alaeiyan, M., Parsa, S., Vinod, P., & Conti, M. (2020). Detection of algorithmically-generated domains: An adversarial machine learning approach. Computer Communications, 160, 661\u2013673.","journal-title":"Computer Communications"},{"issue":"1","key":"1073_CR21","doi-asserted-by":"publisher","first-page":"102933","DOI":"10.1016\/j.jisa.2021.102933","volume":"61","author":"L Yang","year":"2021","unstructured":"Yang, L., Liu, G., Wang, J., Bai, H., & Dai, Y. (2021). Fast3DS: A real-time full-convolutional malicious domain name detection system. Journal of Information Security and Applications, 61(1), 102933.","journal-title":"Journal of Information Security and Applications"},{"key":"1073_CR22","doi-asserted-by":"publisher","first-page":"107841","DOI":"10.1016\/j.compeleceng.2022.107841","volume":"100","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Guo, Y., & Montgomery, D. (2022). Machine learning-based algorithmically generated domain detection. Computers & Electrical Engineering, 100, 107841.","journal-title":"Computers & Electrical Engineering"},{"key":"1073_CR23","doi-asserted-by":"publisher","first-page":"102662","DOI":"10.1016\/j.cose.2022.102662","volume":"116","author":"KH Park","year":"2022","unstructured":"Park, K. H., Song, H. M., Yoo, J. D., Hong, S.-Y., Cho, B., Kim, K., & Kim, H. K. (2022). Unsupervised malicious domain detection with less labeling effort. Computers & Security, 116, 102662.","journal-title":"Computers & Security"},{"key":"1073_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103135","volume":"190","author":"Intercepting Hail Hydra","year":"2021","unstructured":"Intercepting Hail Hydra. (2021). Real-time detection of algorithmically generated domains. Journal of Network and Computer Applications, 190, 103135.","journal-title":"Journal of Network and Computer Applications"},{"key":"1073_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2016.10.001","volume":"64","author":"TS Wang","year":"2017","unstructured":"Wang, T. S., Lin, H. T., Cheng, W. T., & Chen, C. Y. (2017). DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis. Computers & Security, 64, 1\u201315.","journal-title":"Computers & Security"},{"key":"1073_CR26","volume-title":"D3N: DGA detection with deep-learning through NXDomain","author":"M Tong","year":"2019","unstructured":"Tong, M., Sun, X., Yang, J., Zhang, H., & Liu, H. (2019). D3N: DGA detection with deep-learning through NXDomain. Cham: Springer."},{"key":"1073_CR27","unstructured":"Sch\u00fcppen, S., Teubert, D., Herrmann, P., & Meyer, U. (2018). FANCI: Feature-based automated NXDomain classification and intelligence. In 27th USENIX security symposium (USENIX security 18) (pp. 1165\u20131181)."},{"issue":"5","key":"1073_CR28","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TNET.2012.2184552","volume":"20","author":"S Yadav","year":"2012","unstructured":"Yadav, S., Reddy, A. K., Reddy, A. L., & Ranjan, S. (2012). Detecting algorithmically generated domain-flux attacks with DNS traffic analysis. IEEE\/ACM Transactions on Networking, 20(5), 1663\u20131677.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1073_CR29","doi-asserted-by":"publisher","unstructured":"Yan, D., Zhang, H., Wang, Y., Zang, T., Xu, X., & Zeng, Y. (2019). Pontus: A linguistics-based DGA detection system. In 2019 IEEE global communications conference (GLOBECOM) (pp. 1\u20136). https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9014040.","DOI":"10.1109\/GLOBECOM38437.2019.9014040."},{"key":"1073_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114551","volume":"170","author":"A Cucchiarelli","year":"2020","unstructured":"Cucchiarelli, A., Morbidoni, C., Spalazzi, L., & Baldi, M. (2020). Algorithmically generated malicious domain names detection based on n-grams features. Expert Systems with Applications, 170, 114551.","journal-title":"Expert Systems with Applications"},{"key":"1073_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101787","volume":"93","author":"A Almashhadani","year":"2020","unstructured":"Almashhadani, A., Kaiiali, M., Carlin, D., & Sezer, S. (2020). MaldomDetector: A system for detecting algorithmically generated domain names with machine learning. Computers & Security, 93, 101787.","journal-title":"Computers & Security"},{"key":"1073_CR32","doi-asserted-by":"publisher","first-page":"109085","DOI":"10.1016\/j.knosys.2022.109085","volume":"250","author":"F Beiranvand","year":"2022","unstructured":"Beiranvand, F., Mehrdad, V., & Dowlatshahi, M. B. (2022). Unsupervised feature selection for image classification: A bipartite matching-based principal component analysis approach. Knowledge-Based Systems, 250, 109085.","journal-title":"Knowledge-Based Systems"},{"key":"1073_CR33","doi-asserted-by":"crossref","unstructured":"Khehra, G., & Sofat, S. (2018). BotScoop: Scalable detection of DGA based botnets using DNS traffic. In 2018 9th international conference on computing, communication and networking technologies (ICCCNT) (pp. 1\u20136).","DOI":"10.1109\/ICCCNT.2018.8493722"},{"key":"1073_CR34","doi-asserted-by":"crossref","unstructured":"Schiavoni, S., Maggi, F., Cavallaro, L., & Zanero, S. (2014). Phoenix: DGA-based botnet tracking and intelligence. In Detection of intrusions and malware, and vulnerability assessment (pp. 192\u2013211).","DOI":"10.1007\/978-3-319-08509-8_11"},{"key":"1073_CR35","doi-asserted-by":"crossref","unstructured":"Curtin, R. R., Gardner, A. B., Grzonkowski, S., Kleymenov, A., & Mosquera, A. (2018). Detecting DGA domains with recurrent neural networks and side information. In Proceedings of the 14th international conference on availability, reliability and security (pp. 1\u201310).","DOI":"10.1145\/3339252.3339258"},{"key":"1073_CR36","doi-asserted-by":"publisher","unstructured":"Zhou, S., Lin, L., Yuan, J., Wang, F., Ling, Z., & Cui, J. (2019). CNN-based DGA detection with high coverage. In 2019 IEEE international conference on intelligence and security informatics (ISI) (pp. 62\u201367). https:\/\/doi.org\/10.1109\/ISI.2019.8823200.","DOI":"10.1109\/ISI.2019.8823200"},{"key":"1073_CR37","unstructured":"Woodbridge, J., Anderson, H. S., Ahuja, A., & Grant, D. (2016). Predicting domain generation algorithms with long short-term memory networks. arXiv:1611.00791"},{"key":"1073_CR38","doi-asserted-by":"publisher","unstructured":"Jiao, H., Wang, Q., Fan, Z., Liu, J., Du, D., Li, N., & Liu, Y. (2022). DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN. In 2022 international conference on computer communications and networks (ICCCN) (pp. 1\u201310). https:\/\/doi.org\/10.1109\/ICCCN54977.2022.9868932","DOI":"10.1109\/ICCCN54977.2022.9868932"},{"key":"1073_CR39","doi-asserted-by":"crossref","unstructured":"Ahluwalia, A., Traore, I., Ganame, K., & Agarwal, N. (2017). Detecting broad length algorithmically generated domains. In Intelligent, secure, and dependable systems in distributed and cloud environments (pp. 19\u201334). Cham: Springer International Publishing.","DOI":"10.1007\/978-3-319-69155-8_2"},{"issue":"2","key":"1073_CR40","doi-asserted-by":"publisher","first-page":"102725","DOI":"10.1016\/j.jisa.2020.102725","volume":"58","author":"C Patsakis","year":"2021","unstructured":"Patsakis, C., & Casino, F. (2021). Exploiting statistical and structural features for the detection of domain generation algorithms. Journal of Information Security and Applications, 58(2), 102725.","journal-title":"Journal of Information Security and Applications"},{"issue":"5","key":"1073_CR41","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/TNNLS.2018.2868847","volume":"30","author":"X Li","year":"2019","unstructured":"Li, X., Zhang, H., Zhang, R., Liu, Y., & Nie, F. (2019). Generalized uncorrelated regression with adaptive graph for unsupervised feature selection. IEEE Transactions on Neural Networks and Learning Systems, 30(5), 1587\u20131595.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"1073_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.07.027","volume":"182","author":"D Huang","year":"2019","unstructured":"Huang, D., Cai, X., & Wang, C. D. (2019). Unsupervised feature selection with multi-subspace randomization and collaboration. Knowledge-Based Systems, 182, 104856.","journal-title":"Knowledge-Based Systems"},{"key":"1073_CR43","doi-asserted-by":"publisher","DOI":"10.3389\/fgene.2021.684100","volume":"12","author":"J Xie","year":"2021","unstructured":"Xie, J., Wang, M., Xu, S., Huang, Z., & Grant, P. W. (2021). The unsupervised feature selection algorithms based on standard deviation and cosine similarity for genomic data analysis. Frontiers in Genetics, 12, 684100.","journal-title":"Frontiers in Genetics"},{"key":"1073_CR44","doi-asserted-by":"publisher","unstructured":"Yu, B., Gray, D. L., Pan, J., Cock, M., & Nascimento, A. C. A. (2017). Inline DGA detection with deep networks. In 2017 IEEE international conference on data mining workshops (ICDMW) (pp. 683\u2013692). https:\/\/doi.org\/10.1109\/ICDMW.2017.96.","DOI":"10.1109\/ICDMW.2017.96"},{"issue":"12","key":"1073_CR45","doi-asserted-by":"publisher","first-page":"4563","DOI":"10.1109\/TPDS.2022.3196840","volume":"33","author":"X Zhang","year":"2022","unstructured":"Zhang, X., & Wang, T. (2022). Elastic and reliable bandwidth reservation based on distributed traffic monitoring and control. IEEE Transactions on Parallel and Distributed Systems, 33(12), 4563\u20134580.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1073_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3106264","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Wang, Y., Geng, G., & Yu, J. (2021). Delay-optimized multicast tree packing in software-defined networks. IEEE Transactions on Services Computing. https:\/\/doi.org\/10.1109\/TSC.2021.3106264","journal-title":"IEEE Transactions on Services Computing"},{"key":"1073_CR47","doi-asserted-by":"crossref","unstructured":"Tuan, T. A., Long, H. V., & Taniar, D. (2022). On detecting and classifying DGA botnets and their families. Computers & Security, 113, 102549.","DOI":"10.1016\/j.cose.2021.102549"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01073-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-023-01073-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01073-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T04:28:51Z","timestamp":1707539331000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-023-01073-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1073"],"URL":"https:\/\/doi.org\/10.1007\/s11235-023-01073-7","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"28 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}