{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:59:35Z","timestamp":1768683575416,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korea Institute of Science and Technology Information (KISTI)"},{"name":"the Office of Advanced Scientific Computing Research Office of Science of the U.S. Department of Energy","award":["DE-AC02-05CH11231"],"award-info":[{"award-number":["DE-AC02-05CH11231"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,23]]},"DOI":"10.1145\/3391812.3396273","type":"proceedings-article","created":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T23:14:35Z","timestamp":1592349275000},"page":"41-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Transfer Learning Approach for Botnet Detection Based on Recurrent Variational Autoencoder"],"prefix":"10.1145","author":[{"given":"Jeeyung","family":"Kim","sequence":"first","affiliation":[{"name":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alex","family":"Sim","sequence":"additional","affiliation":[{"name":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jinoh","family":"Kim","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, Commerce, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kesheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jaegyoon","family":"Hahm","sequence":"additional","affiliation":[{"name":"KISTI, Daejeon, South Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"BotChase: Graph-Based Bot Detection Using Machine Learning","author":"Daya Abbas Abou","year":"2020","unstructured":"Abbas Abou Daya , Mohammad A Salahuddin , Noura Limam , and Raouf Boutaba .2020. BotChase: Graph-Based Bot Detection Using Machine Learning . IEEE Transactions on Network and Service Management( 2020 ). Abbas Abou Daya, Mohammad A Salahuddin, Noura Limam, and Raouf Boutaba.2020. BotChase: Graph-Based Bot Detection Using Machine Learning. IEEE Transactions on Network and Service Management(2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Basil Alothman. 2018. Similarity-Based Instance Transfer Learning for Botnet Detection.  Basil Alothman. 2018. Similarity-Based Instance Transfer Learning for Botnet Detection.","DOI":"10.1007\/978-3-030-01771-2_7"},{"key":"e_1_3_2_1_3_1","volume-title":"Variational autoencoder based anomaly detection using reconstruction probability. Special Lecture on IE2, 1","author":"An Jinwon","year":"2015","unstructured":"Jinwon An and Sungzoon Cho . 2015. Variational autoencoder based anomaly detection using reconstruction probability. Special Lecture on IE2, 1 ( 2015 ). Jinwon An and Sungzoon Cho. 2015. Variational autoencoder based anomaly detection using reconstruction probability. Special Lecture on IE2, 1 (2015)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"J Andrews Thomas Tanay Edward J Morton and Lewis D Griffin. 2016. Transfer representation-learning for anomaly detection. JMLR.  J Andrews Thomas Tanay Edward J Morton and Lewis D Griffin. 2016. Transfer representation-learning for anomaly detection. JMLR.","DOI":"10.1117\/12.2261101"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997492"},{"key":"e_1_3_2_1_6_1","volume-title":"Fabio Di Troia, and Mark Stamp","author":"Bhodia Niket","year":"2019","unstructured":"Niket Bhodia , Pratikkumar Prajapati , Fabio Di Troia, and Mark Stamp . 2019 . Transfer learning for image-based malware classification. arXiv preprint arXiv:1903.11551(2019). Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, and Mark Stamp. 2019. Transfer learning for image-based malware classification. arXiv preprint arXiv:1903.11551(2019)."},{"key":"e_1_3_2_1_7_1","first-page":"7","article-title":"An algorithm for anomaly-based botnet detection","volume":"6","author":"Binkley James R","year":"2006","unstructured":"James R Binkley and Suresh Singh . 2006 . An algorithm for anomaly-based botnet detection . SRUTI 6 (2006), 7 -- 7 . James R Binkley and Suresh Singh. 2006. An algorithm for anomaly-based botnet detection. SRUTI 6 (2006), 7--7.","journal-title":"SRUTI"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Samuel R Bowman Luke Vilnis Oriol Vinyals Andrew M Dai Rafal Jozefowicz and Samy Bengio. 2015. Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349(2015).  Samuel R Bowman Luke Vilnis Oriol Vinyals Andrew M Dai Rafal Jozefowicz and Samy Bengio. 2015. Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349(2015).","DOI":"10.18653\/v1\/K16-1002"},{"key":"e_1_3_2_1_9_1","volume-title":"Aditya Krishna Menon, and Sanjay Chawla","author":"Chalapathy Raghavendra","year":"2018","unstructured":"Raghavendra Chalapathy , Aditya Krishna Menon, and Sanjay Chawla . 2018 . Anomaly de tection using one-class neural networks. arXiv preprint arXiv:1802.06360(2018). Raghavendra Chalapathy, Aditya Krishna Menon, and Sanjay Chawla. 2018. Anomaly detection using one-class neural networks. arXiv preprint arXiv:1802.06360(2018)."},{"key":"e_1_3_2_1_10_1","volume-title":"Exploring the Use of Autoencoders for Botnets Traffic Representation. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 57--62","author":"Dargenio Ruggiero","year":"2018","unstructured":"Ruggiero Dargenio , Shashank Srikant , Erik Hemberg , and Una-May O'Reilly . 2018 . Exploring the Use of Autoencoders for Botnets Traffic Representation. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 57--62 . Ruggiero Dargenio, Shashank Srikant, Erik Hemberg, and Una-May O'Reilly. 2018. Exploring the Use of Autoencoders for Botnets Traffic Representation. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 57--62."},{"key":"e_1_3_2_1_11_1","volume-title":"FENet: Roles Classification of IP Addresses Using Connection Patterns. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT). IEEE,158--164","author":"Du Fei","year":"2019","unstructured":"Fei Du , Yongzheng Zhang , Xiuguo Bao , and Boyuan Liu . 2019 . FENet: Roles Classification of IP Addresses Using Connection Patterns. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT). IEEE,158--164 . Fei Du, Yongzheng Zhang, Xiuguo Bao, and Boyuan Liu. 2019. FENet: Roles Classification of IP Addresses Using Connection Patterns. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT). IEEE,158--164."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sebastian Garcia Martin Grill Jan Stiborek and Alejandro Zunino. 2014. An empirical comparison of botnet detection methods. computers & security 45(2014) 100--123.  Sebastian Garcia Martin Grill Jan Stiborek and Alejandro Zunino. 2014. An empirical comparison of botnet detection methods. computers & security 45(2014) 100--123.","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"e_1_3_2_1_13_1","unstructured":"Guofei Gu Junjie Zhang and Wenke Lee. 2008. BotSniffer: Detecting botnet command and control channels in network traffic. (2008).  Guofei Gu Junjie Zhang and Wenke Lee. 2008. BotSniffer: Detecting botnet command and control channels in network traffic. (2008)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.27"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC47392.2019.8958732"},{"key":"e_1_3_2_1_16_1","unstructured":"Jeeyung Kim Alex Sim Jinoh Kim and Kesheng Wu. 2020. Botnet Detection Using Recurrent Variational Autoencoder. arXiv:2004.00234  Jeeyung Kim Alex Sim Jinoh Kim and Kesheng Wu. 2020. Botnet Detection Using Recurrent Variational Autoencoder. arXiv:2004.00234"},{"key":"e_1_3_2_1_17_1","unstructured":"Atsutoshi Kumagai Tomoharu Iwata and Yasuhiro Fujiwara. 2019. Transfer Anomaly Detection by Inferring Latent Domain Representations. In Advances in Neural Information Processing Systems. 2467--2477.  Atsutoshi Kumagai Tomoharu Iwata and Yasuhiro Fujiwara. 2019. Transfer Anomaly Detection by Inferring Latent Domain Representations. In Advances in Neural Information Processing Systems. 2467--2477."},{"key":"e_1_3_2_1_18_1","first-page":"2579","article-title":"Visualizing data using t-SNE","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing data using t-SNE . Journal of machine learning research 9 , Nov (2008), 2579 -- 2605 . Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, Nov (2008), 2579--2605.","journal-title":"Journal of machine learning research 9"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Miguel Nicolau James McDermott etal 2018. Learning neural representations for network anomaly detection. IEEE transactions on cybernetics 49 8 (2018) 3074--3087.  Miguel Nicolau James McDermott et al. 2018. Learning neural representations for network anomaly detection. IEEE transactions on cybernetics 49 8 (2018) 3074--3087.","DOI":"10.1109\/TCYB.2018.2838668"},{"key":"e_1_3_2_1_21_1","unstructured":"Talha Ongun Timothy Sakharaov Simona Boboila Alina Oprea and Tina Eliassi-Rad. 2019. On Designing Machine Learning Models for Malicious Network Traffic Classification. arXiv preprint arXiv:1907.04846(2019).  Talha Ongun Timothy Sakharaov Simona Boboila Alina Oprea and Tina Eliassi-Rad. 2019. On Designing Machine Learning Models for Malicious Network Traffic Classification. arXiv preprint arXiv:1907.04846(2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_23_1","volume-title":"Bro: a system for detecting network intruders in real-time. Computer networks 31, 23--24","author":"Paxson Vern","year":"1999","unstructured":"Vern Paxson . 1999. Bro: a system for detecting network intruders in real-time. Computer networks 31, 23--24 ( 1999 ), 2435--2463. Vern Paxson. 1999. Bro: a system for detecting network intruders in real-time. Computer networks 31, 23--24 (1999), 2435--2463."},{"key":"e_1_3_2_1_24_1","unstructured":"Adam Roberts Jesse Engel Colin Raffel Curtis Hawthorne and Douglas Eck. 2018. A hierarchical latent vector model for learning long-term structure in music. arXiv preprint arXiv:1803.05428(2018).  Adam Roberts Jesse Engel Colin Raffel Curtis Hawthorne and Douglas Eck. 2018. A hierarchical latent vector model for learning long-term structure in music. arXiv preprint arXiv:1803.05428(2018)."},{"key":"e_1_3_2_1_25_1","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"Martin Roesch","year":"1999","unstructured":"Martin Roesch et al. 1999 . Snort: Lightweight intrusion detection for networks . In Lisa , Vol. 99. 229 -- 238 . Martin Roesch et al. 1999. Snort: Lightweight intrusion detection for networks. In Lisa, Vol. 99. 229--238.","journal-title":"Lisa"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.066"},{"key":"e_1_3_2_1_27_1","volume-title":"Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning. In 2019 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE,69--74","author":"Singla Ankush","year":"2019","unstructured":"Ankush Singla , Elisa Bertino , and Dinesh Verma . 2019 . Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning. In 2019 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE,69--74 . Ankush Singla, Elisa Bertino, and Dinesh Verma. 2019. Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning. In 2019 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE,69--74."},{"key":"e_1_3_2_1_28_1","unstructured":"Kapil Sinha Arun Viswanathan and Julian Bunn. 2019. Tracking Temporal Evolution of Network Activity for Botnet Detection.arXiv preprint arXiv:1908.03443(2019).  Kapil Sinha Arun Viswanathan and Julian Bunn. 2019. Tracking Temporal Evolution of Network Activity for Botnet Detection.arXiv preprint arXiv:1908.03443(2019)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785439"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc2040037"},{"key":"e_1_3_2_1_31_1","volume-title":"An analysis of recurrent neural networks for botnet detection behavior. In 2016 IEEE biennial congress of Argentina (ARGENCON)","author":"Torres Pablo","unstructured":"Pablo Torres , Carlos Catania , Sebastian Garcia , and Carlos Garcia Garino . 2016. An analysis of recurrent neural networks for botnet detection behavior. In 2016 IEEE biennial congress of Argentina (ARGENCON) . IEEE , 1--6. Pablo Torres, Carlos Catania, Sebastian Garcia, and Carlos Garcia Garino. 2016. An analysis of recurrent neural networks for botnet detection behavior. In 2016 IEEE biennial congress of Argentina (ARGENCON). IEEE, 1--6."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30955-7_5"},{"key":"e_1_3_2_1_33_1","volume-title":"A robust one-class transfer learning method with uncertain data.Knowledge and Information Systems 44, 2","author":"Xiao Yanshan","year":"2015","unstructured":"Yanshan Xiao , Bo Liu , S Yu Philip , and Zhifeng Hao . 2015. A robust one-class transfer learning method with uncertain data.Knowledge and Information Systems 44, 2 ( 2015 ), 407--438. Yanshan Xiao, Bo Liu, S Yu Philip, and Zhifeng Hao. 2015. A robust one-class transfer learning method with uncertain data.Knowledge and Information Systems 44, 2 (2015), 407--438."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563555"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.007"}],"event":{"name":"HPDC '20: The 29th International Symposium on High-Performance Parallel and Distributed Computing","location":"Stockholm Sweden","acronym":"HPDC '20","sponsor":["University of Arizona University of Arizona","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3391812.3396273","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3391812.3396273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:41Z","timestamp":1750200101000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3391812.3396273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,23]]},"references-count":35,"alternative-id":["10.1145\/3391812.3396273","10.1145\/3391812"],"URL":"https:\/\/doi.org\/10.1145\/3391812.3396273","relation":{},"subject":[],"published":{"date-parts":[[2020,6,23]]},"assertion":[{"value":"2020-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}