{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T09:13:07Z","timestamp":1754557987797,"version":"3.37.3"},"reference-count":34,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T00:00:00Z","timestamp":1622419200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836104","61702235","30918012204"],"award-info":[{"award-number":["U1836104","61702235","30918012204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["U1836104","61702235","30918012204"],"award-info":[{"award-number":["U1836104","61702235","30918012204"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,5,31]]},"abstract":"<jats:p>With the development of detection algorithms on malicious dynamic domain names, domain generation algorithms have developed to be more stealthy. The use of multiple elements for generating domains will lead to higher detection difficulty. To effectively improve the detection accuracy of algorithmically generated domain names based on multiple elements, a domain name syntax model is proposed, which analyzes the multiple elements in domain names and their syntactic relationship, and an adaptive embedding method is proposed to achieve effective element parsing of domain names. A parallel convolutional model based on the feature selection module combined with an improved dynamic loss function based on curriculum learning is proposed, which can achieve effective detection on multielement malicious domain names. A series of experiments are designed and the proposed model is compared with five previous algorithms. The experimental results denote that the detection accuracy of the proposed model for multiple-element malicious domain names is significantly higher than that of the comparison algorithms and also has good adaptability to other types of malicious domain names.<\/jats:p>","DOI":"10.1155\/2021\/5567635","type":"journal-article","created":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T21:30:25Z","timestamp":1622583025000},"page":"1-20","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7065-6801","authenticated-orcid":true,"given":"Luhui","family":"Yang","sequence":"first","affiliation":[{"name":"School of Automation, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4729-7406","authenticated-orcid":true,"given":"Guangjie","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"given":"Weiwei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Automation, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8985-6977","authenticated-orcid":true,"given":"Huiwen","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Automation, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8557-9899","authenticated-orcid":true,"given":"Jiangtao","family":"Zhai","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Nanjing University of Information Science and Technology, Nanjing, China"}]}],"member":"311","reference":[{"issue":"6","key":"1","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1109\/TDSC.2018.2858786","article-title":"A risk management approach to defending against the advanced persistent threat","volume":"17","author":"L. Yang","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.019"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2016.76"},{"year":"2015","author":"S. S.","key":"4"},{"key":"5","article-title":"End-to-end analysis of a domain generating algorithm malware family","volume":"2013","author":"J. Geffner","year":"2013","journal-title":"Black Hat USA"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/spe.885"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2668361"},{"key":"8","doi-asserted-by":"crossref","first-page":"2225","DOI":"10.1109\/TIFS.2019.2960647","article-title":"Khaos: an adversarial neural network DGA with high anti-detection ability","volume":"15","author":"X. Yun","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"first-page":"48","article-title":"Detecting algorithmically generated malicious domain names","author":"S. Yadav","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2012.2184552"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2014.01.001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1495"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1147\/jrd.2016.2557639"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020176"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-03703-8"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-017-9666-7"},{"first-page":"395","article-title":"Finding domain-generation algorithms by looking at length distribution","author":"M. Mowbray","key":"19"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.12.008"},{"first-page":"446","article-title":"Winning with DNS failures: strategies for faster botnet detection","author":"S. Yadav","key":"21"},{"first-page":"491","article-title":"From throw-away traffic to bots: detecting the rise of DGA-based malware","author":"M. Antonakakis","key":"22"},{"article-title":"Predicting domain generation algorithms with long short-term memory networks","year":"2016","author":"J. Woodbridge","key":"23"},{"first-page":"683","article-title":"Inline DGA detection with deep networks","author":"B. Yu","key":"24"},{"first-page":"1","article-title":"Character level based detection of DGA domain names","author":"B. Yu","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.11.018"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.3390\/app9204205"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2988877"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.015"},{"first-page":"1","article-title":"Efficient estimation of word representations in vector space","author":"T. Mikolov","key":"30"},{"first-page":"510","article-title":"Selective kernel networks","author":"X. Li","key":"31"},{"issue":"2","key":"32","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/TPAMI.2018.2858826","article-title":"Focal loss for dense object detection","volume":"42","author":"T.-Y. Lin","year":"2018","journal-title":"IEEE Transactions on Pattern Analysis & Machine Intelligence"},{"first-page":"1","article-title":"Minimax curriculum learning: machine teaching with desirable difficulties and scheduled diversity","author":"T. Zhou","key":"33"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101719"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5567635.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5567635.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5567635.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T21:30:32Z","timestamp":1622583032000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5567635\/"}},"subtitle":[],"editor":[{"given":"Jes\u00fas","family":"D\u00edaz-Verdejo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,5,31]]},"references-count":34,"alternative-id":["5567635","5567635"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5567635","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,5,31]]}}}