{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:09:16Z","timestamp":1766491756728,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3727967.3756837","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T11:53:17Z","timestamp":1766490797000},"page":"169-175","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Explainable AI-based Network Intrusion Detection System for Botnet Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9031-9917","authenticated-orcid":false,"given":"Dorieh","family":"Alomari","sequence":"first","affiliation":[{"name":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3479-2058","authenticated-orcid":false,"given":"Maryam Ahmed","family":"Alabdullatif","sequence":"additional","affiliation":[{"name":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia and Imam Abdulrahman bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9130-1874","authenticated-orcid":false,"given":"Fakhri Alam","family":"Khan","sequence":"additional","affiliation":[{"name":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia and Interdisciplinary Research Center of Intelligent Secure Systems (IRC-ISS), King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Rodrigo Abrantes Pedro Mestre and Ant\u00f3nio Cunha. 2022. Exploring dataset manipulation via machine learning for botnet traffic. Procedia Computer Science 196 (2022) 133\u2013141.","DOI":"10.1016\/j.procs.2021.11.082"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3593434.3593967"},{"key":"e_1_3_3_1_4_2","unstructured":"Ashwathy\u00a0Anda Chacko E\u00a0Bijolin Edwin M\u00a0Roshni Thanka and V Ebenezer. 2025. Ensemble of deep learning models with Walrus Optimization Algorithm for accurate botnet recognition and classification. Iran Journal of Computer Science (2025) 1\u201318."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Sebastian Garcia Martin Grill Jan Stiborek and Alejandro Zunino. 2014. An empirical comparison of botnet detection methods. computers & security 45 (2014) 100\u2013123.","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00193"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Swechchha Gupta and Buddha Singh. 2024. An intelligent multi-layer framework with SHAP integration for botnet detection and classification. Computers & Security 140 (2024) 103783.","DOI":"10.1016\/j.cose.2024.103783"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Belal\u00a0Ibrahim Hairab Mahmoud\u00a0Said Elsayed Anca\u00a0D Jurcut and Marianne\u00a0A Azer. 2022. Anomaly detection based on CNN and regularization techniques against zero-day attacks in IoT networks. IEEE Access 10 (2022) 98427\u201398440.","DOI":"10.1109\/ACCESS.2022.3206367"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Dandy\u00a0Pramana Hostiadi and Tohari Ahmad. 2021. Dataset for Botnet group activity with adaptive generator. Data in Brief 38 (2021) 107334.","DOI":"10.1016\/j.dib.2021.107334"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Faisal Hussain Syed\u00a0Ghazanfar Abbas Ivan\u00a0Miguel Pires Sabeeha Tanveer Ubaid\u00a0U Fayyaz Nuno\u00a0M Garcia Ghalib\u00a0A Shah and Farrukh Shahzad. 2021. A two-fold machine learning approach to prevent and detect IoT botnet attacks. Ieee Access 9 (2021) 163412\u2013163430.","DOI":"10.1109\/ACCESS.2021.3131014"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Jalesh Kumar et\u00a0al. 2025. GrMA-CNN: Integrating Spatial-Spectral Layers with Modified Attention for Botnet Detection Using Graph Convolution for Securing Networks. International Journal of Intelligent Engineering & Systems 18 1 (2025).","DOI":"10.22266\/ijies2025.0229.72"},{"key":"e_1_3_3_1_12_2","unstructured":"Partha\u00a0Pratim Kundu Tram Truong-Huu Ling Chen Luying Zhou and Sin\u00a0G Teo. 2022. Detection and classification of botnet traffic using deep learning with model explanation. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Segun\u00a0I Popoola Ruth Ande Bamidele Adebisi Guan Gui Mohammad Hammoudeh and Olamide Jogunola. 2021. Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet of Things Journal 9 5 (2021) 3930\u20133944.","DOI":"10.1109\/JIOT.2021.3100755"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Muhammad Aidiel\u00a0Rachman Putra Dandy\u00a0Pramana Hostiadi and Tohari Ahmad. 2022. Botnet dataset with simultaneous attack activity. Data in Brief 45 (2022) 108628.","DOI":"10.1016\/j.dib.2022.108628"},{"key":"e_1_3_3_1_15_2","first-page":"101","volume-title":"2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","author":"Rabah Nourh\u00e8ne\u00a0Ben","year":"2021","unstructured":"Nourh\u00e8ne\u00a0Ben Rabah, B\u00e9n\u00e9dicte Le\u00a0Grand, and Manuele\u00a0Kirsch Pinheiro. 2021. IoT botnet detection using black-box machine learning models: The trade-off between performance and interpretability. In 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 101\u2013106."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Bruno\u00a0Henrique Schwengber Andressa Verg\u00fctz Nelson\u00a0G Prates and Michele Nogueira. 2021. Learning from network data changes for unsupervised botnet detection. IEEE Transactions on Network and Service Management 19 1 (2021) 601\u2013613.","DOI":"10.1109\/TNSM.2021.3109076"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Hatma Suryotrisongko Yasuo Musashi Akio Tsuneda and Kenichi Sugitani. 2022. Robust botnet DGA detection: Blending XAI and OSINT for cyber threat intelligence sharing. IEEE Access 10 (2022) 34613\u201334624.","DOI":"10.1109\/ACCESS.2022.3162588"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Fatma Taher Mahmoud Abdel-salam Mohamed Elhoseny and Ibrahim\u00a0M El-hasnony. 2023. Reliable Machine Learning Model for IIoT Botnet Detection. IEEE Access (2023).","DOI":"10.1109\/ACCESS.2023.3253432"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Simon\u00a0Nam Thanh\u00a0Vu Mads Stege Peter\u00a0Issam El-Habr Jesper Bang and Nicola Dragoni. 2021. A survey on botnets: Incentives evolution detection and current trends. Future Internet 13 8 (2021) 198.","DOI":"10.3390\/fi13080198"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798287"}],"event":{"name":"EASE Companion '25: Evaluation and Assessment in Software Engineering","acronym":"EASE Companion '25","location":"Istanbul Turkiye"},"container-title":["Proceedings of the 2025 29th International Conference on Evaluation and Assessment in Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727967.3756837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:07:17Z","timestamp":1766491637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727967.3756837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":19,"alternative-id":["10.1145\/3727967.3756837","10.1145\/3727967"],"URL":"https:\/\/doi.org\/10.1145\/3727967.3756837","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}