{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:35Z","timestamp":1765622495701,"version":"3.48.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004242","name":"Princess Nourah bint Abdulrahman University","doi-asserted-by":"crossref","award":["PNURSP2025R54"],"award-info":[{"award-number":["PNURSP2025R54"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02110-9","type":"journal-article","created":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T04:18:11Z","timestamp":1760761091000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["BotWard: A resilient framework for detecting and mitigating botnets in complex social networks through pseudo-random nickname identification"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0944-7856","authenticated-orcid":false,"given":"Riaz Ullah","family":"Khan","sequence":"first","affiliation":[]},{"given":"Hanan","family":"Aljuaid","sequence":"additional","affiliation":[]},{"given":"Dawar","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Rajesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,18]]},"reference":[{"issue":"1","key":"2110_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyad018","volume":"9","author":"S Parkin","year":"2023","unstructured":"Parkin S, Kuhn K, Shaikh SA (2023) Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception. J Cybersecur 9(1):1\u201313","journal-title":"J Cybersecur"},{"key":"2110_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Khan N, Hussain Y, Li B, Kousar T (2024) Fed-inforce-fusion: a federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inf Fusion 101:102002","journal-title":"Inf Fusion"},{"key":"2110_CR3","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-031-42935-4_11","volume-title":"International Conference on Flexible Query Answering Systems","author":"S Lopez-Joya","year":"2023","unstructured":"Lopez-Joya S, Diaz-Garcia JA, Ruiz MD, Martin-Bautista MJ (2023) Bot Detection in Twitter: An Overview. International Conference on Flexible Query Answering Systems. Springer, Cham, pp 131\u2013144"},{"issue":"1","key":"2110_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyab003","volume":"7","author":"JK Haner","year":"2021","unstructured":"Haner JK, Knake R (2021) K breaking botnets: a quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity. J Cybersecur 7(1):1\u201315","journal-title":"J Cybersecur"},{"issue":"1","key":"2110_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-10046-w","volume":"27","author":"H Asad","year":"2022","unstructured":"Asad H, Gashi I (2022) Dynamical analysis of diversity in rule-based open source network intrusion detection systems. Empir Softw Eng 27(1):1\u201330","journal-title":"Empir Softw Eng"},{"key":"2110_CR6","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.future.2023.09.011","volume":"150","author":"RH Randhawa","year":"2024","unstructured":"Randhawa RH, Aslam N, Alauthman M, Khalid M, Rafiq H (2024) Deep reinforcement learning based evasion generative adversarial network for botnet detection. Futur Gener Comput Syst 150:294\u2013302","journal-title":"Futur Gener Comput Syst"},{"key":"2110_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2022.100624","volume":"25","author":"S Srinivasan","year":"2023","unstructured":"Srinivasan S, Deepalakshmi P (2023) Enhancing the security in cyber-world by detecting the botnets using ensemble classification based machine learning. Meas Sensors 25:100624","journal-title":"Meas Sensors"},{"issue":"2","key":"2110_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103197","volume":"60","author":"M Cai","year":"2023","unstructured":"Cai M, Luo H, Meng X, Cui Y, Wang W (2023) Network distribution and sentiment interaction: information diffusion mechanisms between social bots and human users on social media. Inf Process Manag 60(2):103197","journal-title":"Inf Process Manag"},{"issue":"9","key":"2110_CR9","first-page":"975","volume":"34","author":"AK Tyagi","year":"2011","unstructured":"Tyagi AK, Aghila G (2011) A wide scale survey on botnet. Int J Comput Appl 34(9):975\u20138887","journal-title":"Int J Comput Appl"},{"key":"2110_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111473","volume":"269","author":"H Rezaei","year":"2025","unstructured":"Rezaei H, Taheri R, Shojafar M (2025) FedLLMGuard: a federated large language model for anomaly detection in 5G networks. Comput Networks 269:111473","journal-title":"Comput Networks"},{"issue":"1","key":"2110_CR11","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/TNSM.2025.3525554","volume":"22","author":"E Nowroozi","year":"2025","unstructured":"Nowroozi E, Haider I, Taheri R, Conti M (2025) Federated learning under attack: exposing vulnerabilities through data poisoning attacks in computer networks. IEEE Trans Netw Serv Manage 22(1):822\u2013831","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2110_CR12","doi-asserted-by":"crossref","unstructured":"Nabavirazavi S, Taheri R, Shojafar M, Iyengar SS (2023) Impact of Aggregation Function Randomization against Model Poisoning in Federated Learning. Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom\/BigDataSE\/CSE\/EUC\/iSCI 2023, pages 165\u2013172","DOI":"10.1109\/TrustCom60117.2023.00043"},{"issue":"4","key":"2110_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-09971-7","volume":"26","author":"M Mohamad","year":"2021","unstructured":"Mohamad M, Stegh\u00effer JP, Scandariato R (2021) Security assurance cases-state of the art of an emerging approach. Empir Softw Eng 26(4):1\u201343","journal-title":"Empir Softw Eng"},{"key":"2110_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103013","volume":"124","author":"D Nevado-Catal\u00e1n","year":"2023","unstructured":"Nevado-Catal\u00e1n D, Pastrana S, Vallina-Rodriguez N, Tapiador J (2023) An analysis of fake social media engagement services. Comput Secur 124:103013","journal-title":"Comput Secur"},{"key":"2110_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103195","volume":"129","author":"C Wei","year":"2023","unstructured":"Wei C, Xie G, Diao Z (2023) A lightweight deep learning framework for botnet detecting at the iot edge. Comput Secur 129:103195","journal-title":"Comput Secur"},{"issue":"6","key":"2110_CR16","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/JBHI.2024.3352013","volume":"28","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Zia U, Kamal S, Hussain Y (2024) A novel collaborative SRU network with dynamic behaviour aggregation, reduced communication overhead and explainable features. IEEE J Biomed Health Inform 28(6):3228\u20133235","journal-title":"IEEE J Biomed Health Inform"},{"issue":"1","key":"2110_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TIFS.2013.2290197","volume":"9","author":"J Zhang","year":"2014","unstructured":"Zhang J, Perdisci R, Lee W, Luo X, Sarfraz U (2014) Building a scalable system for stealthy P2P-botnet detection. IEEE Trans Inf Forensics Secur 9(1):27\u201338","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2110_CR18","doi-asserted-by":"crossref","unstructured":"Khan, R.U., Almakdi, S., Alshehri, M., Kumar, R., Ali, I., Hussain, S.M., Haq, A.U., Khan, I., Ullah, A. and Uddin, M.I. Probabilistic Approach to COVID-19 Data Analysis and Forecasting Future Outbreaks Using a Multi-Layer Perceptron Neural Network. Diagnostics 2022, Vol. 12, Page 2539, 12(10):2539, (2022)","DOI":"10.3390\/diagnostics12102539"},{"key":"2110_CR19","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.future.2022.10.024","volume":"141","author":"A Guerra-Manzanares","year":"2023","unstructured":"Guerra-Manzanares A, Bahsi H (2023) On the application of active learning for efficient and effective IoT botnet detection. Futur Gener Comput Syst 141:40\u201353","journal-title":"Futur Gener Comput Syst"},{"key":"2110_CR20","first-page":"441","volume-title":"Lecture Notes in Electrical Engineering","author":"R Mishra","year":"2022","unstructured":"Mishra R, Jha SK (2022) Survey on Botnet Detection Techniques. Lecture Notes in Electrical Engineering, vol 825. Singapore. Springer, Singapore, pp 441\u2013449"},{"issue":"4","key":"2110_CR21","doi-asserted-by":"publisher","first-page":"2242","DOI":"10.1109\/COMST.2015.2457491","volume":"17","author":"N Hoque","year":"2015","unstructured":"Hoque N, Bhattacharyya DK, Kalita JK (2015) Botnet in DDoS attacks: trends and challenges. IEEE Commun Surv Tutor 17(4):2242\u20132270","journal-title":"IEEE Commun Surv Tutor"},{"issue":"11","key":"2110_CR22","doi-asserted-by":"publisher","first-page":"1906","DOI":"10.1109\/TIFS.2014.2357251","volume":"9","author":"X Ma","year":"2014","unstructured":"Ma X, Zhang J, Tao J, Li J, Tian J, Guan X (2014) Dnsradar: outsourcing malicious domain detection based on distributed cache-footprints. IEEE Trans Inf Forensics Secur 9(11):1906\u20131921","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2110_CR23","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.socnet.2020.06.005","volume":"69","author":"LB Weissinger","year":"2022","unstructured":"Weissinger LB (2022) Building trust and co-designing a study of trust and co-operation: observations from a network study in a high-risk, high-security environment. Soc Networks 69:136\u2013148","journal-title":"Soc Networks"},{"key":"2110_CR24","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.isatra.2023.12.005","volume":"145","author":"AK Mishra","year":"2024","unstructured":"Mishra AK, Paliwal S, Srivastava G (2024) Anomaly detection using deep convolutional generative adversarial networks in the internet of things. ISA Trans 145:493\u2013504","journal-title":"ISA Trans"},{"key":"2110_CR25","doi-asserted-by":"crossref","unstructured":"Khan IA, Pi D, Kamal S, Alsuhaibani M, Alshammari BM (2024) Federated-Boosting: A Distributed and Dynamic Boosting-Powered Cyber-Attack Detection Scheme for Security and Privacy of Consumer IoT. IEEE Transactions on Consumer Electronics, pages 1\u20131","DOI":"10.1109\/TCE.2024.3499942"},{"issue":"16","key":"2110_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/s20164372","volume":"20","author":"YN Soe","year":"2020","unstructured":"Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K (2020) Machine learning-based iot-botnet attack detection with sequential architecture. Sensors (Basel) 20(16):4372","journal-title":"Sensors (Basel)"},{"key":"2110_CR27","unstructured":"Kaspersky Lab (2018) New IoT-malware grew three-fold in H1 2018 | Kaspersky"},{"key":"2110_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2022.100739","volume":"74","author":"VA Horta","year":"2022","unstructured":"Horta VA, Str\u00f6ele V, Oliveira J, Braga R, David JMN, Campos F (2022) Detecting topic-based communities in social networks: a study in a real software development network. J Web Semant 74:100739","journal-title":"J Web Semant"},{"issue":"7","key":"2110_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-022-10233-3","volume":"27","author":"R Natella","year":"2022","unstructured":"Natella R (2022) StateAFL: greybox fuzzing for stateful network servers. Empir Softw Eng 27(7):1\u201331","journal-title":"Empir Softw Eng"},{"issue":"15","key":"2110_CR30","doi-asserted-by":"publisher","DOI":"10.3390\/s23156757","volume":"23","author":"LF Ilca","year":"2023","unstructured":"Ilca LF, Lucian OP, Balan TC (2023) Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response. Sensors (Basel) 23(15):6757","journal-title":"Sensors (Basel)"},{"issue":"6","key":"2110_CR31","first-page":"3245","volume":"15","author":"R Rawat","year":"2023","unstructured":"Rawat R, Chakrawarti RK, Raj ASA, Mani G, Chidambarathanu K, Bhardwaj R (2023) Association rule learning for threat analysis using traffic analysis and packet filtering approach. Int J Inf Technol 15(6):3245\u20133255","journal-title":"Int J Inf Technol"},{"key":"2110_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102549","volume":"113","author":"TA Tuan","year":"2022","unstructured":"Tuan TA, Long HV, Taniar D (2022) On detecting and classifying DGA botnets and their families. Comput Secur 113:102549","journal-title":"Comput Secur"},{"key":"2110_CR33","doi-asserted-by":"crossref","unstructured":"Fedynyshyn G, Chuah MC, Tan G (2011) Detection and classification of different botnet C &C channels. In: International Conference on Autonomic and Trusted Computing. ATC 2011, pages 228\u2013242, Berlin, Heidelberg. Lecture Notes in Computer Science, vol 6906. Springer","DOI":"10.1007\/978-3-642-23496-5_17"},{"issue":"11","key":"2110_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/app9112375","volume":"9","author":"RU Khan","year":"2019","unstructured":"Khan RU, Zhang X, Kumar R, Sharif A, Golilarz NA, Alazab M (2019) An adaptive multi-layer botnet detection technique using machine learning classifiers. Appl Sci 9(11):2375","journal-title":"Appl Sci"},{"key":"2110_CR35","doi-asserted-by":"crossref","unstructured":"Liao W-H, Chang C-C (2010) Peer to peer botnet detection using data mining scheme. In: Internet Technology and Applications, 2010 International Conference on, pages 1\u20134. IEEE","DOI":"10.1109\/ITAPP.2010.5566407"},{"key":"2110_CR36","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108\u2013116","journal-title":"ICISSp"},{"key":"2110_CR37","first-page":"18","volume-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 13857 LNCS","author":"M Lanvin","year":"2023","unstructured":"Lanvin M, Gimenez PF, Han Y, Majorczyk F, M\u00e9 L, Totel \u00c9 (2023) Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 13857 LNCS. Springer, Cham, pp 18\u201333"},{"key":"2110_CR38","doi-asserted-by":"crossref","unstructured":"Liu L, Engelen G, Lynar T, Essam D, Joosen W (2022) Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. In: 2022 IEEE Conference on Communications and Network Security, CNS 2022, pages 254\u2013263. Institute of Electrical and Electronics Engineers Inc","DOI":"10.1109\/CNS56114.2022.9947235"},{"key":"2110_CR39","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","volume":"45","author":"S Garcia","year":"2014","unstructured":"Garcia S, Grill M, Stiborek J, Zunino A (2014) An empirical comparison of botnet detection methods. Comput Secur 45:100\u2013123","journal-title":"Comput Secur"},{"issue":"2","key":"2110_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app9020277","volume":"9","author":"R Kumar","year":"2019","unstructured":"Kumar R, Zhang X, Khan RU, Sharif A (2019) Research on data mining of permission-induced risk for Android IoT devices. Appl Sci 9(2):1\u201322","journal-title":"Appl Sci"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02110-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02110-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02110-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:00Z","timestamp":1765622220000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02110-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2110"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02110-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"18 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"303"}}