{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:16:45Z","timestamp":1773519405487,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Science Foundation","award":["2113945"],"award-info":[{"award-number":["2113945"]}]},{"name":"National Science Foundation","award":["2200538"],"award-info":[{"award-number":["2200538"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Internet has become a vital part of our daily lives, serving as a hub for global connectivity and a facilitator for seamless communication and information exchange. However, the rise of malicious domains presents a serious challenge, undermining the reliability of the Internet and posing risks to user safety. These malicious activities exploit the Domain Name System (DNS) to deceive users, leading to harmful activities such as spreading drive-by-download malware, operating botnets, creating phishing sites, and sending spam. In response to this growing threat, the application of Machine Learning (ML) techniques has proven to be highly effective. These methods excel in quickly and accurately detecting, classifying, and analyzing such threats. This paper explores the latest developments in using transfer learning for the classification of malicious domains, with a focus on image visualization as a key methodological approach. Our proposed solution has achieved a remarkable testing accuracy rate of 98.67%, demonstrating its effectiveness in detecting and classifying malicious domains.<\/jats:p>","DOI":"10.1007\/s44163-024-00154-z","type":"journal-article","created":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T01:02:01Z","timestamp":1722042121000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Transfer learning with ResNet50 for malicious domains classification using image visualization"],"prefix":"10.1007","volume":"4","author":[{"given":"Fikirte Ayalke","family":"Demmese","sequence":"first","affiliation":[]},{"given":"Shaghayegh","family":"Shajarian","sequence":"additional","affiliation":[]},{"given":"Sajad","family":"Khorsandroo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,26]]},"reference":[{"key":"154_CR1","unstructured":"PaloAltoNetworks: Stop Attackers from using DNS against you. 2023. https:\/\/start.paloaltonetworks.com\/protect-your-dns-traffic-against-threats? Accessed 18 June 2023."},{"key":"154_CR2","first-page":"1","volume":"2019","author":"H Zhao","year":"2019","unstructured":"Zhao H, Chang Z, Bao G, Zeng X, et al. Malicious domain names detection algorithm based on n-gram. J Comput Netw Commun. 2019;2019:1.","journal-title":"J Comput Netw Commun."},{"issue":"1","key":"154_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1186\/s42400-023-00170-z","volume":"6","author":"FA Demmese","year":"2023","unstructured":"Demmese FA, Neupane A, Khorsandroo S, Wang M, Roy K, Fu Y. Machine learning based fileless malware traffic classification using image visualization. Cybersecurity. 2023;6(1):32.","journal-title":"Cybersecurity"},{"issue":"1","key":"154_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11416-018-0323-0","volume":"15","author":"D Gibert","year":"2019","unstructured":"Gibert D, Mateu C, Planes J, Vicens R. Using convolutional neural networks for classification of malware represented as images. J Comput Virol Hacking Tech. 2019;15(1):15\u201328.","journal-title":"J Comput Virol Hacking Tech"},{"key":"154_CR5","doi-asserted-by":"crossref","unstructured":"Nataraj L, Karthikeyan S, Jacob G, Manjunath BS. Malware images: visualization and automatic classification. In: Proceedings of the 8th International symposium on visualization for cyber security. 2011. ACM: 2011. p. 1\u20137.","DOI":"10.1145\/2016904.2016908"},{"key":"154_CR6","unstructured":"TensorFlow v2.12.0. https:\/\/tensorflow.org\/api.docs\/python\/tf\/keras\/applications\/resnet50\/ResNet50. 2023. Accessed 18-April-2023"},{"key":"154_CR7","unstructured":"Kim I, Choi H, Lee H. Botnet visualization using dns traffic. In: Proc. of WISA. 2008."},{"key":"154_CR8","doi-asserted-by":"crossref","unstructured":"Ren P, Kristoff J, Gooch B. Visualizing dns traffic. In: Proceedings of the 3rd International workshop on visualization for computer security. 2006. p. 23\u201330.","DOI":"10.1145\/1179576.1179582"},{"key":"154_CR9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.diin.2018.09.006","volume":"27","author":"Y Dai","year":"2018","unstructured":"Dai Y, Li H, Qian Y, Lu X. A malware classification method based on memory dump grayscale image. Digit Investig. 2018;27:30\u20137.","journal-title":"Digit Investig"},{"key":"154_CR10","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1016\/j.cose.2018.04.005","volume":"77","author":"S Ni","year":"2018","unstructured":"Ni S, Qian Q, Zhang R. Malware identification using visualization images and deep learning. Comput Secur. 2018;77:871\u201385.","journal-title":"Comput Secur"},{"key":"154_CR11","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhao S, Zhang J, Ma X, Huang F. Stnn: a novel tls\/ssl encrypted traffic classification system based on stereo transform neural network. In: 2019 IEEE 25th International conference on parallel and distributed systems (ICPADS). IEEE: 2019. p. 907\u2013910","DOI":"10.1109\/ICPADS47876.2019.00133"},{"issue":"4","key":"154_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3191329","volume":"51","author":"Y Zhauniarovich","year":"2018","unstructured":"Zhauniarovich Y, Khalil I, Yu T, Dacier M. A survey on malicious domains detection through DNS data analysis. ACM Comput Surv (CSUR). 2018;51(4):1\u201336.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"154_CR13","doi-asserted-by":"publisher","first-page":"012169","DOI":"10.1088\/1742-6596\/1544\/1\/012169","volume":"1544","author":"K Zhang","year":"2020","unstructured":"Zhang K, Ji W, Li N, Wang Y, Liao S. Detection of malicious domain name based on dns data analysis. J Phys Conf Ser. 2020;1544:012169.","journal-title":"J Phys Conf Ser"},{"key":"154_CR14","doi-asserted-by":"publisher","first-page":"85127","DOI":"10.1109\/ACCESS.2022.3198072","volume":"10","author":"T Van Dao","year":"2022","unstructured":"Van Dao T, Sato H, Kubo M. An attention mechanism for combination of cnn and vae for image-based malware classification. IEEE Access. 2022;10:85127\u201336.","journal-title":"IEEE Access"},{"issue":"2","key":"154_CR15","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/TAI.2021.3054609","volume":"1","author":"S Niu","year":"2020","unstructured":"Niu S, Liu Y, Wang J, Song H. A decade survey of transfer learning (2010\u20132020). IEEE Trans Artif Intell. 2020;1(2):151\u201366.","journal-title":"IEEE Trans Artif Intell"},{"issue":"18","key":"154_CR16","doi-asserted-by":"publisher","first-page":"8972","DOI":"10.3390\/app12188972","volume":"12","author":"M Shafiq","year":"2022","unstructured":"Shafiq M, Gu Z. Deep residual learning for image recognition: a survey. Appl Sci. 2022;12(18):8972.","journal-title":"Appl Sci"},{"key":"154_CR17","unstructured":"Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. arXiv preprint. 2014. https:\/\/arxiv.org\/abs\/1409.1556."},{"key":"154_CR18","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z. Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016. p. 2818\u20132826.","DOI":"10.1109\/CVPR.2016.308"},{"key":"154_CR19","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M, et al. Imagenet large scale visual recognition challenge. Int J Comput Vision. 2015;115:211\u201352.","journal-title":"Int J Comput Vision"},{"issue":"1","key":"154_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/JPROC.2020.3004555","volume":"109","author":"F Zhuang","year":"2020","unstructured":"Zhuang F, Qi Z, Duan K, Xi D, Zhu Y, Zhu H, Xiong H, He Q. A comprehensive survey on transfer learning. Proc IEEE. 2020;109(1):43\u201376.","journal-title":"Proc IEEE"},{"key":"154_CR21","unstructured":"Kingma DP, Ba J. Adam: a method for stochastic optimization. arXiv preprint. 2014. https:\/\/arxiv.org\/abs\/1412.6980."},{"key":"154_CR22","doi-asserted-by":"crossref","unstructured":"Mahdavifar S, Maleki N, Lashkari AH, Broda M, Razavi AH. Classifying malicious domains using dns traffic analysis. In: 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE: 2021. p. 60\u201367.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech52372.2021.00024"},{"key":"154_CR23","unstructured":"Canadian institute of cybersecurity: CIC-Bell-DNS 2021 Dataset. 2021. https:\/\/www.unb.ca\/cic\/datasets\/dns-2021.html. Accessed 05 Jan 2023."},{"issue":"3\u20134","key":"154_CR24","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/S0925-2312(97)00054-4","volume":"17","author":"TF Rathbun","year":"1997","unstructured":"Rathbun TF, Rogers SK, DeSimio MP, Oxley ME. Mlp iterative construction algorithm. Neurocomputing. 1997;17(3\u20134):195\u2013216.","journal-title":"Neurocomputing"},{"key":"154_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103545","volume":"136","author":"A Prasad","year":"2024","unstructured":"Prasad A, Chandra S. PhiUSIIL: a diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. Comput Secur. 2024;136: 103545.","journal-title":"Comput Secur"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-024-00154-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-024-00154-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-024-00154-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T01:15:18Z","timestamp":1722042918000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-024-00154-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["154"],"URL":"https:\/\/doi.org\/10.1007\/s44163-024-00154-z","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,26]]},"assertion":[{"value":"12 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"52"}}