{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T05:41:45Z","timestamp":1761716505055,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,13]],"date-time":"2017-10-13T00:00:00Z","timestamp":1507852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,13]]},"DOI":"10.1145\/3136825.3136874","type":"proceedings-article","created":{"date-parts":[[2018,1,26]],"date-time":"2018-01-26T13:06:00Z","timestamp":1516971960000},"page":"91-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["A comparative analysis of machine learning techniques for botnet detection"],"prefix":"10.1145","author":[{"given":"Ankit","family":"Bansal","sequence":"first","affiliation":[{"name":"IIT Kharagpur, Kharagpur, West Bengal"}]},{"given":"Sudipta","family":"Mahapatra","sequence":"additional","affiliation":[{"name":"IIT Kharagpur, Kharagpur, West Bengal"}]}],"member":"320","published-online":{"date-parts":[[2017,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. UNB Intrusion detection evaluation dataset. ({n. d.}). URL:http:\/\/www.unb.ca\/cic\/research\/datasets\/ids.htm  {n. d.}. UNB Intrusion detection evaluation dataset. ({n. d.}). URL:http:\/\/www.unb.ca\/cic\/research\/datasets\/ids.htm"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"e_1_3_2_1_3_1","unstructured":"A. Conway. 2014. FlowMeter: UNB CIC Network traffic Flow Generator. (2014). URL:http:\/\/www.unb.ca\/cic\/research\/dataset\/flowmeter.html\/#ISCXFlowMeter.  A. Conway. 2014. FlowMeter: UNB CIC Network traffic Flow Generator. (2014). URL:http:\/\/www.unb.ca\/cic\/research\/dataset\/flowmeter.html\/#ISCXFlowMeter."},{"key":"e_1_3_2_1_4_1","unstructured":"A. Conway. 2014. Twenty Years of Spam. (2014). http:\/\/blog.cloudmark.com\/2014\/04\/11\/twenty-years-of-spam\/  A. Conway. 2014. Twenty Years of Spam. (2014). http:\/\/blog.cloudmark.com\/2014\/04\/11\/twenty-years-of-spam\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_10"},{"key":"e_1_3_2_1_6_1","volume-title":"{n. d.}. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. ({n. d.}). arXiv preprint arXiv:1603.04467v2","author":"Abadi","year":"2016","unstructured":"M. Abadi et al. {n. d.}. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. ({n. d.}). arXiv preprint arXiv:1603.04467v2 , 2016 . M. Abadi et al. {n. d.}. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. ({n. d.}). arXiv preprint arXiv:1603.04467v2, 2016."},{"key":"e_1_3_2_1_7_1","unstructured":"Pedregosa et al. {n. d.}. Scikit-learn: Machine Learning in Python. JMLR ({n. d.}).   Pedregosa et al. {n. d.}. Scikit-learn: Machine Learning in Python. JMLR ({n. d.})."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 17th conference on Security symposium","author":"Zhang W","year":"2008","unstructured":"J. Zhang W Lee G. Gu , R. Perdisci . 2008 . BotMiner: clustering analysis of network traffic for protocol and structure independent botnet detection . In Proceedings of the 17th conference on Security symposium . Berkeley, CA, USA, 139--154. J. Zhang W Lee G. Gu, R. Perdisci. 2008. BotMiner: clustering analysis of network traffic for protocol and structure independent botnet detection. In Proceedings of the 17th conference on Security symposium. Berkeley, CA, USA, 139--154."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 16th USENIX Security Symposium","author":"Yegneswaran M.","year":"2007","unstructured":"V. Yegneswaran M. Fong W. Lee G. Gu , P. Porras . 2007 . Bothunter: Detecting malware infection through ids-driven dialog correlation . In Proceedings of the 16th USENIX Security Symposium . Boston, USA, 1--16. V. Yegneswaran M. Fong W. Lee G. Gu, P. Porras. 2007. Bothunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium. Boston, USA, 1--16."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of IEEE International Conference on Platform Technology and Service","author":"Thu H.","year":"2016","unstructured":"H. L. T. Thu , H. Kim J. Kim , J. Kim . 2016 . Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection . In Proceedings of IEEE International Conference on Platform Technology and Service . Jeju, Korea, 1--5. H. L. T. Thu, H. Kim J. Kim, J. Kim. 2016. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection. In Proceedings of IEEE International Conference on Platform Technology and Service. Jeju, Korea, 1--5."},{"key":"e_1_3_2_1_11_1","volume-title":"The unreasonable effectiveness of recurrent neural networks. Andrej Karpathy blog","author":"Andrej Karpathy","year":"2015","unstructured":"Andrej Karpathy . 2015. The unreasonable effectiveness of recurrent neural networks. Andrej Karpathy blog ( 2015 ). Andrej Karpathy. 2015. The unreasonable effectiveness of recurrent neural networks. Andrej Karpathy blog (2015)."},{"key":"e_1_3_2_1_12_1","volume-title":"Understanding LSTM networks. GITHUB blog, posted on August 27","author":"Christopher Olah","year":"2015","unstructured":"Christopher Olah . 2015. Understanding LSTM networks. GITHUB blog, posted on August 27 ( 2015 ). Christopher Olah. 2015. Understanding LSTM networks. GITHUB blog, posted on August 27 (2015)."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of European Symposium on Research in Computer Security: ESORICS. 232--249","author":"Holz J.","year":"2009","unstructured":"T. Holz J. Goebel C. Kruegel E. Kirda P. Wurzinger , L. Bilge . 2009 . Automatically generating models for botnet detection . In Proceedings of European Symposium on Research in Computer Security: ESORICS. 232--249 . T. Holz J. Goebel C. Kruegel E. Kirda P. Wurzinger, L. Bilge. 2009. Automatically generating models for botnet detection. In Proceedings of European Symposium on Research in Computer Security: ESORICS. 232--249."},{"key":"e_1_3_2_1_14_1","unstructured":"LLC QoSient. 2009. Argus-auditing network activity. (2009).  LLC QoSient. 2009. Argus-auditing network activity. (2009)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"}],"event":{"name":"SIN '17: Security of Information and Networks","acronym":"SIN '17","location":"Jaipur India"},"container-title":["Proceedings of the 10th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136825.3136874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:17Z","timestamp":1750212677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,13]]},"references-count":15,"alternative-id":["10.1145\/3136825.3136874","10.1145\/3136825"],"URL":"https:\/\/doi.org\/10.1145\/3136825.3136874","relation":{},"subject":[],"published":{"date-parts":[[2017,10,13]]},"assertion":[{"value":"2017-10-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}