{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T14:04:59Z","timestamp":1778508299484,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T00:00:00Z","timestamp":1512604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,7]]},"DOI":"10.1145\/3155133.3155166","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T13:26:53Z","timestamp":1512998813000},"page":"211-218","source":"Crossref","is-referenced-by-count":48,"title":["DGA Botnet Detection Using Supervised Learning Methods"],"prefix":"10.1145","author":[{"given":"Hieu","family":"Mac","sequence":"first","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST, Vietnam"}]},{"given":"Duc","family":"Tran","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST, Vietnam"}]},{"given":"Van","family":"Tong","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST, Vietnam"}]},{"given":"Linh Giang","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST, Vietnam"}]},{"given":"Hai Anh","family":"Tran","sequence":"additional","affiliation":[{"name":"Bach Khoa Cybersecurity Centre, HUST, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2184552"},{"key":"e_1_3_2_1_2_1","volume-title":"the 21st USENIX Security Symposium (USENIX Security 12)","author":"Antonakakis M.","year":"2012"},{"key":"e_1_3_2_1_3_1","unstructured":"Y. Zhou Q.S. Li Q. Miao K. Yin DGA-Based Botnet Detection Using DNS Traffic Journal of Internet Services and Information Security 3.3\/4 (2013): 116--123. Y. Zhou Q.S. Li Q. Miao K. Yin DGA-Based Botnet Detection Using DNS Traffic Journal of Internet Services and Information Security 3.3\/4 (2013): 116--123."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_11"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the IEEE International Workshop on Traffic Monitoring and Analaysis.","author":"Zhang H.","year":"2016"},{"key":"e_1_3_2_1_6_1","unstructured":"L. Bilge E. Kirda C. Kruegel and M. Balduzzi EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Ndss. 2011. L. Bilge E. Kirda C. Kruegel and M. Balduzzi EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Ndss. 2011."},{"key":"e_1_3_2_1_7_1","unstructured":"Y. Shi C. Gong and L. Juntao Malicious Domain Name Detection Based on Extreme Machine Learning Neural Processing Letters (2017): 1--11. Y. Shi C. Gong and L. Juntao Malicious Domain Name Detection Based on Extreme Machine Learning Neural Processing Letters (2017): 1--11."},{"key":"e_1_3_2_1_8_1","unstructured":"J. Woodbridge H.S. Anderson A. Ahuja and D. Grant Predicting Domain Generation Algorithms with Long Short-Term Memory Networks. arXiv preprint arXiv:1611.00791 (2016). J. Woodbridge H.S. Anderson A. Ahuja and D. Grant Predicting Domain Generation Algorithms with Long Short-Term Memory Networks. arXiv preprint arXiv:1611.00791 (2016)."},{"key":"e_1_3_2_1_9_1","unstructured":"Y. Tang Deep learning using linear support vector machines arXiv preprint arXiv:1306.0239 (2013). Y. Tang Deep learning using linear support vector machines arXiv preprint arXiv:1306.0239 (2013)."},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE International Conference on Acoustics. Speech and Signal Processing (ICASSP)","author":"Zhang S.X.","year":"2016"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Kim Yoon etal Character-Aware Neural Language Models. AAAI. 2016. Kim Yoon et al. Character-Aware Neural Language Models. AAAI. 2016.","DOI":"10.1609\/aaai.v30i1.10362"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"e_1_3_2_1_13_1","unstructured":"S. Hochreiter and J. Schmidhuber Long short-term memory Neural computation 9(8) (1997): 1735--1780. 10.1162\/neco.1997.9.8.1735 S. Hochreiter and J. Schmidhuber Long short-term memory Neural computation 9(8) (1997): 1735--1780. 10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_14_1","unstructured":"FA. Gers J. Schmidhuber and F. Cummins Learning to forget: Continual prediction with LSTM Neural computation 12(10) (2000): 2451--2471. 10.1162\/089976600300015015 FA. Gers J. Schmidhuber and F. Cummins Learning to forget: Continual prediction with LSTM Neural computation 12(10) (2000): 2451--2471. 10.1162\/089976600300015015"},{"key":"e_1_3_2_1_15_1","unstructured":"Jay Jacobs Building a DGA Classifier: Feature Engineering. Available online at: http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Oct\/dga-part2\/. October 2014 Jay Jacobs Building a DGA Classifier: Feature Engineering. Available online at: http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Oct\/dga-part2\/. October 2014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575364"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"N. Cristianini and J. Shawe-Taylor An introduction to support vector machines and other kernel-based learning methods Cambridge university press 2000. N. Cristianini and J. Shawe-Taylor An introduction to support vector machines and other kernel-based learning methods Cambridge university press 2000.","DOI":"10.1017\/CBO9780511801389"},{"key":"e_1_3_2_1_18_1","volume-title":"Tenth international workshop on frontiers in handwriting recognition. La Baule.","author":"Milgram J.","year":"2006"},{"key":"e_1_3_2_1_19_1","volume-title":"Elsevier","author":"Quinlan J.R.","year":"2014"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume":"7","author":"Huang G.B","year":"2006","journal-title":"Neurocomputing"},{"key":"e_1_3_2_1_21_1","unstructured":"W. Yin K. Kann M. Yu and H. Sch\u00fctze Comparative Study of CNN and RNN for Natural Language Processing arXiv preprint arXiv:1702. 01923 (2017). W. Yin K. Kann M. Yu and H. Sch\u00fctze Comparative Study of CNN and RNN for Natural Language Processing arXiv preprint arXiv:1702. 01923 (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011112"},{"key":"e_1_3_2_1_23_1","unstructured":"P. Su X. Ding Y. Zhang Y. Li and N. Zhao Predicting Blood Pressure with Deep Bidirectional LSTM Network arXiv preprint arXiv:1705.04524 (2017). P. Su X. Ding Y. Zhang Y. Li and N. Zhao Predicting Blood Pressure with Deep Bidirectional LSTM Network arXiv preprint arXiv:1705.04524 (2017)."},{"key":"e_1_3_2_1_24_1","unstructured":"J. Dem\u0161ar Statistical comparisons of classifiers over multiple data sets Journal of Machine learning research 7 (2006): 1--30. J. Dem\u0161ar Statistical comparisons of classifiers over multiple data sets Journal of Machine learning research 7 (2006): 1--30."},{"issue":"2","key":"e_1_3_2_1_25_1","first-page":"255","volume":"17","author":"Alcal\u00e1-Fdez J.","journal-title":"Multiple-Valued Logic Soft Computing"},{"key":"e_1_3_2_1_26_1","unstructured":"Chollet Fran\u00e7ois. Keras (2015). URL http:\/\/keras.io (2017). Chollet Fran\u00e7ois. Keras (2015). URL http:\/\/keras.io (2017)."},{"key":"e_1_3_2_1_27_1","first-page":"2825","volume":"12","year":"2011","journal-title":"Scikit-learn: Machine learning in Python, Journal of Machine Learning Research"},{"key":"e_1_3_2_1_28_1","unstructured":"Does Alexa have a list of its top-ranked websites? Available online at: https:\/\/support.alexa.com\/hc\/en-us\/articles\/200449834-Does-Alexa-have-a-list-of-its-topranked-websites-. (2017). Does Alexa have a list of its top-ranked websites? Available online at: https:\/\/support.alexa.com\/hc\/en-us\/articles\/200449834-Does-Alexa-have-a-list-of-its-topranked-websites-. (2017)."},{"key":"e_1_3_2_1_29_1","unstructured":"Bambenek Consulting - Master feeds. Available online at: http:\/\/osint.bambenekconsulting.com\/feeds\/ (2016). Bambenek Consulting - Master feeds. Available online at: http:\/\/osint.bambenekconsulting.com\/feeds\/ (2016)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDFMA.2008.4784437"},{"key":"e_1_3_2_1_31_1","unstructured":"M. Antonakakis etal Building a Dynamic Reputation System for DNS USENIX security symposium. 2010. M. Antonakakis et al. Building a Dynamic Reputation System for DNS USENIX security symposium. 2010."},{"key":"e_1_3_2_1_32_1","unstructured":"Kotsiantis Sotiris B. I. Zaharakis and P. Pintelas. Supervised machine learning: A review of classification techniques. (2007): 3--24. Kotsiantis Sotiris B. I. Zaharakis and P. Pintelas. Supervised machine learning: A review of classification techniques. (2007): 3--24."}],"event":{"name":"SoICT 2017: The Eighth International Symposium on Information and Communication Technology","location":"Nha Trang City Viet Nam","acronym":"SoICT 2017","sponsor":["SOICT School of Information and Communication Technology - HUST","NAFOSTED The National Foundation for Science and Technology Development"]},"container-title":["Proceedings of the Eighth International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155166","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3155133.3155166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:28Z","timestamp":1750217428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,7]]},"references-count":32,"alternative-id":["10.1145\/3155133.3155166","10.1145\/3155133"],"URL":"https:\/\/doi.org\/10.1145\/3155133.3155166","relation":{},"subject":[],"published":{"date-parts":[[2017,12,7]]}}}