{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:02:50Z","timestamp":1775667770830,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724358","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Lightweight Real-Time C&amp;C Detection using Deep Learning for Zombie DNS Queries"],"prefix":"10.1109","author":[{"given":"Vidhun","family":"K","sequence":"first","affiliation":[{"name":"Amrita School of Computing Amrita Vishwa Vidyapeetham,Department of Computer Science and Applications,Amritapuri,India"}]},{"given":"Jinesh M.","family":"Kannimoola","sequence":"additional","affiliation":[{"name":"Amrita School of Computing Amrita Vishwa Vidyapeetham,Department of Computer Science and Applications,Amritapuri,India"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Attack superhighway: A deep dive on malicious dns traffic","author":"Tribbey","journal-title":"Akamai Technologies"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIDCA56705.2023.10100279"},{"key":"ref3","article-title":"Command & control: Understanding, denying and detecting-a review of malware c2 techniques, detection and defences","author":"Gardiner","year":"2015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS55398.2022.9800787"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INCET61516.2024.10593568"},{"key":"ref6","article-title":"Driftingcloud: Zero-day sophos firewall exploitation and an insidious breach-volexity","author":"Adair","year":"2022"},{"key":"ref7","article-title":"Ml in security: Detect suspicious txt records using deep learning","author":"Sreekanta","year":"2023"},{"key":"ref8","article-title":"Dns tunneling: how dns can be (ab)used by malicious actors [snippet]","volume":"42","author":"Hinchliffe","year":"2019","journal-title":"Unit"},{"key":"ref9","article-title":"Rust: The programming language for safety and performance","author":"Bugden","year":"2022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCMI59957.2023.10458486"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IC-NIDC54101.2021.9660578"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"103132","DOI":"10.1016\/j.cose.2023.103132","article-title":"Fecc: Dns tunnel detection model based on cnn and clustering","volume":"128","author":"Liang","year":"2023","journal-title":"Computers Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00080"},{"key":"ref14","article-title":"TCPDump","year":"2024"},{"key":"ref15","article-title":"CICFlowMeter","year":"2023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16837-7_7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13057-2_6"},{"key":"ref18","first-page":"63","article-title":"Detection of doh tunnels using time-series classification of encrypted traffic","volume-title":"2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress","author":"MontazeriShatoori"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS55398.2022.9800787"},{"key":"ref20","article-title":"Wireguard: A modern vpn tunnel","author":"Donenfeld"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kamand, India","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724358.pdf?arnumber=10724358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:42:31Z","timestamp":1732682551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724358","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}