{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T12:33:38Z","timestamp":1774701218344,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/100008900","name":"University of South Florida","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008900","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1633978"],"award-info":[{"award-number":["1633978"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1620871"],"award-info":[{"award-number":["1620871"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1636622"],"award-info":[{"award-number":["1636622"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1620862"],"award-info":[{"award-number":["1620862"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"BBN\/GPO Project 1936 through an NSF\/CNS Grant"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2891588","type":"journal-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T20:33:37Z","timestamp":1548966817000},"page":"32765-32782","source":"Crossref","is-referenced-by-count":72,"title":["A Machine Learning Framework for Domain Generation Algorithm-Based Malware Detection"],"prefix":"10.1109","volume":"7","author":[{"given":"Yi","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2933-8083","authenticated-orcid":false,"given":"Kaiqi","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0446-1325","authenticated-orcid":false,"given":"Tommy","family":"Chin","sequence":"additional","affiliation":[]},{"given":"Chengbin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"woodbridge","year":"2016","journal-title":"Predicting Domain Generation Algorithms with Long Short-Term Memory Networks"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2013.6682860"},{"key":"ref33","first-page":"4","article-title":"Behind phishing: An examination of phisher modi operandi","volume":"8","author":"mcgrath","year":"2008","journal-title":"Proc lEE"},{"key":"ref32","author":"wang","year":"2015","journal-title":"Breaking bad Detecting malicious domains using word segmentation"},{"key":"ref31","first-page":"24","article-title":"From throw-away traffic to Bots: Detecting the rise of DGA-based malware","volume":"12","author":"antonakakis","year":"2012","journal-title":"Proc Usenix Secur Symp"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.03.003"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398410"},{"key":"ref35","first-page":"1","article-title":"EXPOSURE: Finding malicious domains using passive DNS analysis","author":"bilge","year":"2011","journal-title":"Proc NDSS"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2010.5"},{"key":"ref60","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref62","author":"jarvis","year":"2019","journal-title":"CryptoLocker Ransomware"},{"key":"ref61","year":"2017","journal-title":"Domain Feed of Known DGA Domains"},{"key":"ref63","year":"0","journal-title":"A Collection of Known Domain Generation Algorithms"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2014.20"},{"key":"ref64","year":"2016","journal-title":"Top Million Websites & TLDs"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3003816"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357519"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2013.28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69155-8_2"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2008.9"},{"key":"ref2","first-page":"270","article-title":"SDN-based kernel modular countermeasure for intrusion detection","author":"chin","year":"2017","journal-title":"Proc 13rd EAI Int Conf Secur Privacy Commun Netw"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"ref20","first-page":"1","article-title":"Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm","volume":"8","author":"holz","year":"2008","journal-title":"Proc lEE"},{"key":"ref22","article-title":"Inside the storm: Protocols and encryption of the storm botnet","author":"stewart","year":"2009","journal-title":"Proc Black Hat Technical Security Conf"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"ref23","author":"phillip porras","year":"2009","journal-title":"Conficker C P2P protocol and implementation"},{"key":"ref26","first-page":"1","article-title":"Automatic extraction of domain name generation algorithms from current malware","author":"barabosch","year":"2012","journal-title":"Proc NATO Symp IST-111 Inf Assurance Cyber Defense"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.11"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-016-0355-x"},{"key":"ref59","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_1"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.002"},{"key":"ref55","year":"2019","journal-title":"OSINT Feeds From Bambenek Consulting"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.96"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.037"},{"key":"ref11","first-page":"226","article-title":"A density-based algorithm for discovering clusters a density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"0","journal-title":"Proc 1st Intl Conf on Knowledge Discovery and Data Mining (KDD)"},{"key":"ref40","first-page":"1","article-title":"We know it before you do: Predicting malicious domains","author":"xu","year":"2014","journal-title":"Proc Virus Bull Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2015.18"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EITEC.2016.7503690"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2017.8250515"},{"key":"ref17","first-page":"446","article-title":"Winning with DNS failures: Strategies for faster botnet detection","author":"yadav","year":"2011","journal-title":"Proc Int Conf Secur Privacy Commun Syst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2184552"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2013.108"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.106"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.76"},{"key":"ref5","first-page":"192","article-title":"Phoenix: DGA-based botnet tracking and intelligence","author":"schiavoni","year":"2014","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/9781118898598"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5160987"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2015.7326945"},{"key":"ref9","author":"xiong","year":"2008","journal-title":"Resource Optimization and Security in Distributed Computing"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.215"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2134090"},{"key":"ref48","first-page":"513","article-title":"Domain adaptation for large-scale sentiment classification: A deep learning approach","author":"glorot","year":"2011","journal-title":"Proc 28th Int Conf Mach Learn (ICML)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2325029"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-013-3903-7"},{"key":"ref41","author":"saxe","year":"2017","journal-title":"eXpose A character-level convolutional neural network with embeddings for detecting malicious urls file paths and registry keys"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6287639\/8600701\/8631171-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08631171.pdf?arnumber=8631171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:53:49Z","timestamp":1649444029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8631171\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2891588","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}