{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:22:30Z","timestamp":1767183750198,"version":"3.40.3"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2023YFB3106800"],"award-info":[{"award-number":["2023YFB3106800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62227805,62072398,62172405"],"award-info":[{"award-number":["62227805,62072398,62172405"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20220075"],"award-info":[{"award-number":["BK20220075"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1109\/secon64284.2024.10934888","type":"proceedings-article","created":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:56:29Z","timestamp":1743130589000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["A Large-Scale P2P Botnet Detection Framework via Topology and Traffic Co-Verification"],"prefix":"10.1109","author":[{"given":"Ziming","family":"Zhao","sequence":"first","affiliation":[{"name":"Zhejiang University,China"}]},{"given":"Zhaoxuan","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,SKLOIS,China"}]},{"given":"Tingting","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang University,China"}]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University,China"}]}],"member":"263","reference":[{"article-title":"The circle of life: A large-scale study of the iot malware lifecycle","volume-title":"USENIX Security Symposium","author":"Alrawi","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284505"},{"key":"ref4","first-page":"2661","article-title":"Poster: Challenges of accurately measuring churn in P2P botnets","volume-title":"CCS","author":"Bock","year":"2019"},{"key":"ref5","article-title":"Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering","volume-title":"CCS","author":"Caballero","year":"2009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"article-title":"CAIDA","volume-title":"The caida ucsd anonymized internet traces","year":"2018","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866355"},{"article-title":"CIC","volume-title":"Botnet dataset. [EB\/OL]","year":"2014","key":"ref9"},{"key":"ref10","article-title":"Modeling botnet propagation using time zones","author":"Dagon","year":"2006","journal-title":"NDSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"article-title":"Measurement and classification of humans and bots in internet chat","volume-title":"USENIX Security Symposium","author":"Gianvecchio","key":"ref13"},{"article-title":"Bothunter: Detecting malware infection through ids-driven dialog correlation","volume-title":"USENIX Security Symposium","author":"Gu","key":"ref14"},{"article-title":"Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection","volume-title":"USENIX Security Symposium","author":"Gu","key":"ref15"},{"key":"ref16","article-title":"Botsniffer: Detecting botnet command and control channels in network traffic","author":"Gu","year":"2008","journal-title":"NDSS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23488"},{"key":"ref18","article-title":"Attention-based deep multiple instance learning","volume-title":"ICML","author":"Ilse","year":"2018"},{"key":"ref19","article-title":"Towards automated detection of peer-to-peer botnets: On the limits of local approaches","volume-title":"LEET","author":"Jelasity","year":"2009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013971"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_9"},{"key":"ref22","article-title":"A natural policy gradient","volume-title":"NIPS","author":"Kakade","year":"2001"},{"key":"ref23","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2017","journal-title":"ICLR (Poster). OpenReview.net"},{"article-title":"Effective and efficient malware detection at the end host","volume-title":"USENIX Security Symposium","author":"Kolbitsch","key":"ref24"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1109\/CSCWD61410.2024.10580010","article-title":"An automated alert cross-verification system with graph neural networks for IDS events","volume-title":"CSCWD","author":"Li","year":"2024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3216603"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"110563","DOI":"10.1016\/j.comnet.2024.110563","article-title":"metanet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm","volume":"250","author":"Li","year":"2024","journal-title":"Comput. Networks"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-54773-7_12","article-title":"Ddosminer: An automated framework for ddos attack characterization and vulnerability mining","volume-title":"ACNS","author":"Ling","year":"2024"},{"key":"ref30","first-page":"1171","article-title":"Fs-net: A flow sequence network for encrypted traffic classification","volume-title":"INFOCOM","author":"Liu","year":"2019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100747"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"ref33","article-title":"Kitsune: An ensemble of autoencoders for online network intrusion detection","author":"Mirsky","year":"2018","journal-title":"NDSS"},{"key":"ref34","article-title":"Beheading hydras: performing effective botnet takedowns","author":"Nadji","year":"2013","journal-title":"CCS. ACM"},{"article-title":"Botgrep: Finding P2P bots with structured graph analysis","volume-title":"USENIX Security Symposium","author":"Nagaraja","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.17"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277206"},{"key":"ref38","article-title":"I2RNN: An Incremental and Interpretable Recurrent Neural Network for Encrypted Traffic Classification","author":"Song","year":"2023","journal-title":"IEEE TDSC"},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1145\/383059.383071","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","volume-title":"SIGCOMM","author":"Stoica","year":"2001"},{"article-title":"BOTMAGNIFIER: locating spambots on the internet","volume-title":"USENIX Security Symposium","author":"Stringhini","key":"ref40"},{"key":"ref41","article-title":"Policy gradient methods for reinforcement learning with function approximation","volume-title":"NIPS","author":"Sutton","year":"1999"},{"key":"ref42","article-title":"Detecting stealthy botnets in a resource-constrained environment using reinforcement learning","author":"Venkatesan","year":"2017","journal-title":"MTD@CCS.ACM"},{"key":"ref43","article-title":"Army of botnets","author":"Vogt","year":"2007","journal-title":"NDSS"},{"key":"ref44","article-title":"POSTER: A hybrid botnet ecological environment","volume-title":"CCS","author":"Yumei","year":"2014"},{"key":"ref45","article-title":"Intention and origination: An inside look at large-scale bot queries","author":"Zhang","year":"2013","journal-title":"NDSS"},{"key":"ref46","article-title":"Building a scalable system for stealthy p2p-botnet detection","author":"Zhang","year":"2014","journal-title":"IEEE TIFS"},{"key":"ref47","article-title":"CMD: Co-analyzed IoT Malware Detection and Forensics via Network and Hardware Domains","author":"Zhao","year":"2023","journal-title":"IEEE TMC"},{"key":"ref48","article-title":"ERNN: Error-Resilient RNN for Encrypted Traffic Detection towards Network-Induced Phenomena","author":"Zhao","year":"2023","journal-title":"IEEE TDSC"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3226572"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS59052.2023.00045"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103663"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3413789"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3651524"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3672202.3673720"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621290"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645407"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3349180"},{"key":"ref58","article-title":"Automating botnet detection with graph neural networks","author":"Zhou","year":"2020","journal-title":"CoRR, abs\/2003.06344"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881657"}],"event":{"name":"2024 21st Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","start":{"date-parts":[[2024,12,2]]},"location":"Phoenix, AZ, USA","end":{"date-parts":[[2024,12,4]]}},"container-title":["2024 21st Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10934812\/10934772\/10934888.pdf?arnumber=10934888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T20:46:02Z","timestamp":1743194762000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10934888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/secon64284.2024.10934888","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]}}}