{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:39:45Z","timestamp":1767706785210,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508102","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"195-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Machine Learning for Botnet Detection: An Optimized Feature Selection Approach"],"prefix":"10.1145","author":[{"given":"Moemedi","family":"Lefoane","sequence":"first","affiliation":[{"name":"University of Bradford, UK"}]},{"given":"Ibrahim","family":"Ghafir","sequence":"additional","affiliation":[{"name":"University of Bradford, UK"}]},{"given":"Sohag","family":"Kabir","sequence":"additional","affiliation":[{"name":"University of Bradford, UK"}]},{"given":"Irfan-Ullah","family":"Awan","sequence":"additional","affiliation":[{"name":"University of Bradford, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Snort. https:\/\/www.snort.org\/. Accessed: 2021-10-20.  2021. Snort. https:\/\/www.snort.org\/. Accessed: 2021-10-20."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Zeek. https:\/\/zeek.org\/. Accessed: 2021-10-20.  2021. Zeek. https:\/\/zeek.org\/. Accessed: 2021-10-20."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2018.8374749"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D.M. Diab B. AsSadhan H. Binsalleeh S. Lambotharan K.G. Kyriakopoulos and I. Ghafir. 2021. Denial of service detection using dynamic time warping. International Journal of Network Management(2021). http:\/\/hdl.handle.net\/10454\/18458  D.M. Diab B. AsSadhan H. Binsalleeh S. Lambotharan K.G. Kyriakopoulos and I. Ghafir. 2021. Denial of service detection using dynamic time warping. International Journal of Network Management(2021). http:\/\/hdl.handle.net\/10454\/18458","DOI":"10.1002\/nem.2159"},{"key":"e_1_3_2_1_7_1","volume-title":"2017 International Conference on Inventive Communication and Computational Technologies (ICICCT). 10\u201315","author":"Gaddam RaviTeja","year":"2017","unstructured":"RaviTeja Gaddam and M. Nandhini . 2017. An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment . In 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT). 10\u201315 . https:\/\/doi.org\/10.1109\/ICICCT. 2017 .7975177 10.1109\/ICICCT.2017.7975177 RaviTeja Gaddam and M. Nandhini. 2017. An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment. In 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT). 10\u201315. https:\/\/doi.org\/10.1109\/ICICCT.2017.7975177"},{"key":"#cr-split#-e_1_3_2_1_8_1.1","unstructured":"Sebastian Garcia Agustin Parmisano and Maria\u00a0Jose Erquiaga. 2020. IoT-23: A labeled dataset with malicious and benign IoT network traffic. https:\/\/doi.org\/10.5281\/zenodo.4743746 More details here https:\/\/www.stratosphereips.org \/datasets-iot23. 10.5281\/zenodo.4743746"},{"key":"#cr-split#-e_1_3_2_1_8_1.2","unstructured":"Sebastian Garcia Agustin Parmisano and Maria\u00a0Jose Erquiaga. 2020. IoT-23: A labeled dataset with malicious and benign IoT network traffic. https:\/\/doi.org\/10.5281\/zenodo.4743746 More details here https:\/\/www.stratosphereips.org \/datasets-iot23."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of student conference Zvule, IEEE\/UREL","author":"Ghafir Ibrahim","year":"2014","unstructured":"Ibrahim Ghafir , Martin Husak , and Vaclav Prenosil . 2014 . A survey on intrusion detection and prevention systems . In Proceedings of student conference Zvule, IEEE\/UREL . Brno University of Technology, Vol.\u00a01014. Ibrahim Ghafir, Martin Husak, and Vaclav Prenosil. 2014. A survey on intrusion detection and prevention systems. In Proceedings of student conference Zvule, IEEE\/UREL. Brno University of Technology, Vol.\u00a01014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2855078"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930200"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231097"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341325.3342018"},{"key":"e_1_3_2_1_14_1","volume-title":"Identification of Botnet Activity in IoT Network Traffic Using Machine Learning. In 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA). 21\u201327","author":"Hegde Mandira","year":"2020","unstructured":"Mandira Hegde , Gilles Kepnang , Mashail Al\u00a0Mazroei , Jeffrey\u00a0 S. Chavis , and Lanier Watkins . 2020 . Identification of Botnet Activity in IoT Network Traffic Using Machine Learning. In 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA). 21\u201327 . https:\/\/doi.org\/10.1109\/IDSTA50958.2020.9264143 10.1109\/IDSTA50958.2020.9264143 Mandira Hegde, Gilles Kepnang, Mashail Al\u00a0Mazroei, Jeffrey\u00a0S. Chavis, and Lanier Watkins. 2020. Identification of Botnet Activity in IoT Network Traffic Using Machine Learning. In 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA). 21\u201327. https:\/\/doi.org\/10.1109\/IDSTA50958.2020.9264143"},{"key":"e_1_3_2_1_15_1","volume-title":"VisSRA: Visualizing Snort Rules and Alerts. In 2012 Fourth International Conference on Computational Intelligence and Communication Networks. 441\u2013444","author":"Hong Xiaojin","year":"2012","unstructured":"Xiaojin Hong , Changzhen Hu , Zhigang Wang , Guoqiang Wang , and Ying Wan . 2012 . VisSRA: Visualizing Snort Rules and Alerts. In 2012 Fourth International Conference on Computational Intelligence and Communication Networks. 441\u2013444 . https:\/\/doi.org\/10.1109\/CICN.2012.207 10.1109\/CICN.2012.207 Xiaojin Hong, Changzhen Hu, Zhigang Wang, Guoqiang Wang, and Ying Wan. 2012. VisSRA: Visualizing Snort Rules and Alerts. In 2012 Fourth International Conference on Computational Intelligence and Communication Networks. 441\u2013444. https:\/\/doi.org\/10.1109\/CICN.2012.207"},{"key":"e_1_3_2_1_16_1","volume-title":"Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach. In 2020 32nd International Conference on Microelectronics (ICM). 1\u20134. https:\/\/doi.org\/10","author":"Injadat MohammadNoor","year":"2020","unstructured":"MohammadNoor Injadat , Abdallah Moubayed , and Abdallah Shami . 2020 . Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach. In 2020 32nd International Conference on Microelectronics (ICM). 1\u20134. https:\/\/doi.org\/10 .1109\/ICM50269.2020.9331794 10.1109\/ICM50269.2020.9331794 MohammadNoor Injadat, Abdallah Moubayed, and Abdallah Shami. 2020. Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach. In 2020 32nd International Conference on Microelectronics (ICM). 1\u20134. https:\/\/doi.org\/10.1109\/ICM50269.2020.9331794"},{"key":"e_1_3_2_1_17_1","volume-title":"Electronics Mobile Communication Conference (UEMCON). 0517\u20130521","author":"Joshi Shreehar","year":"2020","unstructured":"Shreehar Joshi and Eman Abdelfattah . 2020 . Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks. In 2020 11th IEEE Annual Ubiquitous Computing , Electronics Mobile Communication Conference (UEMCON). 0517\u20130521 . https:\/\/doi.org\/10.1109\/UEMCON51285.2020.9298095 10.1109\/UEMCON51285.2020.9298095 Shreehar Joshi and Eman Abdelfattah. 2020. Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON). 0517\u20130521. https:\/\/doi.org\/10.1109\/UEMCON51285.2020.9298095"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"e_1_3_2_1_19_1","unstructured":"Knud\u00a0Lasse Lueth. 2021. State of the IoT 2020: 12 billion IoT connections surpassing non-IoT for the first time. https:\/\/iot-analytics.com\/state-of-the-iot-2020-12-billion-iot-connections-surpassing-non-iot-for-the-first-time\/. Accessed: 2021-10-07.  Knud\u00a0Lasse Lueth. 2021. State of the IoT 2020: 12 billion IoT connections surpassing non-IoT for the first time. https:\/\/iot-analytics.com\/state-of-the-iot-2020-12-billion-iot-connections-surpassing-non-iot-for-the-first-time\/. Accessed: 2021-10-07."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044277"},{"key":"e_1_3_2_1_21_1","volume-title":"An In-Depth Analysis of the Mirai Botnet. In 2017 International Conference on Software Security and Assurance (ICSSA). 6\u201312","author":"Margolis Joel","year":"2017","unstructured":"Joel Margolis , Tae\u00a0Tom Oh , Suyash Jadhav , Young\u00a0Ho Kim , and Jeong\u00a0Neyo Kim . 2017 . An In-Depth Analysis of the Mirai Botnet. In 2017 International Conference on Software Security and Assurance (ICSSA). 6\u201312 . https:\/\/doi.org\/10.1109\/ICSSA.2017.12 10.1109\/ICSSA.2017.12 Joel Margolis, Tae\u00a0Tom Oh, Suyash Jadhav, Young\u00a0Ho Kim, and Jeong\u00a0Neyo Kim. 2017. An In-Depth Analysis of the Mirai Botnet. In 2017 International Conference on Software Security and Assurance (ICSSA). 6\u201312. https:\/\/doi.org\/10.1109\/ICSSA.2017.12"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3008906"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034156"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102341"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231103"},{"key":"e_1_3_2_1_26_1","unstructured":"Satyajit Sinha. 2021. State of IoT 2021: Number of connected IoT devices growing 9% to 12.3 billion globally cellular IoT now surpassing 2 billion. https:\/\/iot-analytics.com\/number-connected-iot-devices\/. Accessed: 2021-10-07.  Satyajit Sinha. 2021. State of IoT 2021: Number of connected IoT devices growing 9% to 12.3 billion globally cellular IoT now surpassing 2 billion. https:\/\/iot-analytics.com\/number-connected-iot-devices\/. Accessed: 2021-10-07."},{"key":"e_1_3_2_1_27_1","volume-title":"Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 20, 16","author":"Soe Yan\u00a0Naung","year":"2020","unstructured":"Yan\u00a0Naung Soe , Yaokai Feng , Paulus\u00a0Insap Santosa , Rudy Hartanto , and Kouichi Sakurai . 2020. Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 20, 16 ( 2020 ). https:\/\/doi.org\/10.3390\/s20164372 10.3390\/s20164372 Yan\u00a0Naung Soe, Yaokai Feng, Paulus\u00a0Insap Santosa, Rudy Hartanto, and Kouichi Sakurai. 2020. Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 20, 16 (2020). https:\/\/doi.org\/10.3390\/s20164372"},{"key":"e_1_3_2_1_28_1","unstructured":"Looking Glass\u00a0Cyber Solutions. 2019. Looking Glass Threat Map. https:\/\/map.lookingglasscyber.com\/. Accessed: 2021-10-07.  Looking Glass\u00a0Cyber Solutions. 2019. Looking Glass Threat Map. https:\/\/map.lookingglasscyber.com\/. Accessed: 2021-10-07."},{"key":"e_1_3_2_1_29_1","volume-title":"Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets. Future Internet 11, 11","author":"Spathoulas Georgios","year":"2019","unstructured":"Georgios Spathoulas , Nikolaos Giachoudis , Georgios-Paraskevas Damiris , and Georgios Theodoridis . 2019. Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets. Future Internet 11, 11 ( 2019 ). https:\/\/doi.org\/10.3390\/fi11110226 10.3390\/fi11110226 Georgios Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris, and Georgios Theodoridis. 2019. Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets. Future Internet 11, 11 (2019). https:\/\/doi.org\/10.3390\/fi11110226"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3055937"},{"key":"e_1_3_2_1_31_1","volume-title":"Android Malware Detection Based on Logistic Regression and XGBoost. In 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS). 528\u2013532","author":"Suhuan Li","year":"2019","unstructured":"Li Suhuan and Huang Xiaojun . 2019 . Android Malware Detection Based on Logistic Regression and XGBoost. In 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS). 528\u2013532 . https:\/\/doi.org\/10.1109\/ICSESS47205.2019.9040851 10.1109\/ICSESS47205.2019.9040851 Li Suhuan and Huang Xiaojun. 2019. Android Malware Detection Based on Logistic Regression and XGBoost. In 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS). 528\u2013532. https:\/\/doi.org\/10.1109\/ICSESS47205.2019.9040851"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3108222"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03028-9"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICoDSA50139.2020.9212932"},{"key":"e_1_3_2_1_35_1","unstructured":"Helena Wood Tom Keatinge Keith Ditcham and Ardi Janjeva. 2021. The Silent Threat: The Impact of Fraud on UK National Security. https:\/\/rusi.org\/explore-our-research\/publications\/occasional-papers\/silent-threat-impact-fraud-uk-national-security. Accessed: 2021-10-07.  Helena Wood Tom Keatinge Keith Ditcham and Ardi Janjeva. 2021. The Silent Threat: The Impact of Fraud on UK National Security. https:\/\/rusi.org\/explore-our-research\/publications\/occasional-papers\/silent-threat-impact-fraud-uk-national-security. Accessed: 2021-10-07."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2016.25"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2940742"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960526"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":39,"alternative-id":["10.1145\/3508072.3508102","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508102","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}