{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:47:18Z","timestamp":1761896838855,"version":"3.37.3"},"reference-count":13,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T00:00:00Z","timestamp":1529452800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2016YFB0801304","2017CX02029"],"award-info":[{"award-number":["2016YFB0801304","2017CX02029"]}]},{"DOI":"10.13039\/501100005085","name":"Beijing Institute of Technology","doi-asserted-by":"publisher","award":["2016YFB0801304","2017CX02029"],"award-info":[{"award-number":["2016YFB0801304","2017CX02029"]}],"id":[{"id":"10.13039\/501100005085","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018,6,20]]},"abstract":"<jats:p>Although existing malicious domains detection techniques have shown great success in many real-world applications, the problem of learning from imbalanced data is rarely concerned with this day. But the actual DNS traffic is inherently imbalanced; thus how to build malicious domains detection model oriented to imbalanced data is a very important issue worthy of study. This paper proposes a novel imbalanced malicious domains detection method based on passive DNS traffic analysis, which can effectively deal with not only the between-class imbalance problem but also the within-class imbalance problem. The experiments show that this proposed method has favorable performance compared to the existing algorithms.<\/jats:p>","DOI":"10.1155\/2018\/6510381","type":"journal-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T19:33:44Z","timestamp":1529523224000},"page":"1-7","source":"Crossref","is-referenced-by-count":13,"title":["An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1079-357X","authenticated-orcid":true,"given":"Zhenyan","family":"Liu","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Yifei","family":"Zeng","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Pengfei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3087-9701","authenticated-orcid":true,"given":"Jingfeng","family":"Xue","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Ji","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Jiangtao","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China"}]}],"member":"311","reference":[{"journal-title":"Usenix Security Symposium","first-page":"273","year":"2010","key":"1"},{"issue":"4","key":"2","first-page":"14","volume":"16","year":"2014","journal-title":"ACM Transactions on Information and System Security"},{"year":"2016","key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.207"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.07.015"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2007853"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.07.007"},{"issue":"1","key":"9","first-page":"321","volume":"16","year":"2002","journal-title":"Journal of Artificial Intelligence Research"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.004"},{"issue":"5","key":"15","first-page":"714","volume":"9","year":"2012","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"16","first-page":"396","volume":"52","year":"2016","journal-title":"Acta Scientiarum Naturalium Universitatis Pekinensis"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/widm.53"},{"year":"2010","key":"20"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/6510381.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/6510381.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/6510381.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T19:33:51Z","timestamp":1529523231000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/6510381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,20]]},"references-count":13,"alternative-id":["6510381","6510381"],"URL":"https:\/\/doi.org\/10.1155\/2018\/6510381","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018,6,20]]}}}