{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:25:15Z","timestamp":1766471115756,"version":"3.48.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.23919\/cnsm67658.2025.11297569","type":"proceedings-article","created":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:40:10Z","timestamp":1766428810000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["IoT Botnet Detection with Drift-Aligned Learning and DNS-Based C2 Identification"],"prefix":"10.23919","author":[{"given":"Jeffrey A.","family":"Adjei","sequence":"first","affiliation":[{"name":"Dalhousie University,Faculty of Computer Science,Halifax,Canada"}]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[{"name":"Dalhousie University,Faculty of Computer Science,Halifax,Canada"}]},{"given":"Malcom","family":"Heywood","sequence":"additional","affiliation":[{"name":"Dalhousie University,Faculty of Computer Science,Halifax,Canada"}]},{"given":"Biswajit","family":"Nandy","sequence":"additional","affiliation":[{"name":"Solana Networks,Ottawa,Canada"}]},{"given":"Nabil","family":"Seddigh","sequence":"additional","affiliation":[{"name":"Solana Networks,Ottawa,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003001126"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNISC60562.2023.00041"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT.2018.8672582"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3429789.3429818"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSC54232.2022.9888913"},{"volume-title":"Rethinking IoT Command and Control: Beyond AWS Shadows.","year":"2024","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767205"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.22247\/ijcna\/2023\/218517"},{"key":"ref9","article-title":"New Mirai variant expands exploits CVE-2020-1017","author":"Remillano","year":"2020","journal-title":"Trend Micro Research Blog"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS57970.2025.11073600"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101806"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3292267"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3158553"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"},{"key":"ref15","article-title":"ACI IoT Network Traffic Dataset 2023","author":"Bastian","year":"2023","journal-title":"IEEE Dataport"},{"key":"ref16","article-title":"IoT network intrusion dataset","author":"Kang","year":"2019","journal-title":"IEEE Dataport"},{"year":"2022","key":"ref17","article-title":"Tranalyzer: Lightweight flow generator"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM62983.2024.10814343"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS59830.2024.10575442"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"ref22","first-page":"167","article-title":"BotHunter: Detecting malware infection through IDS-driven dialog correlation","volume-title":"Proc. 16th USENIX Security Symposium","author":"Gu"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE50685.2021.9427667"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ESIC64052.2025.10962564"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927355"},{"article-title":"Measuring and detecting fast-flux service networks","volume-title":"Proc. 15th Network and Distributed System Security Symposium (NDSS)","author":"Holz","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3131014"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICICNIS64247.2024.10823344"},{"article-title":"Detection of IoT botnets using machine and deep learning techniques: A case study on Aposemat IoT-23 dataset","year":"2023","author":"Anne","key":"ref29"},{"article-title":"\u2019A multi-attention recurrent neural network for detecting command and control traffic in IoT botnets","year":"2021","author":"Gopal","key":"ref30"},{"article-title":"On detecting command and control communication in IoT network traffic","volume-title":"Proc. 2022 Int. Conf. Network and Service Management (CNSM)","author":"Reynvoet","key":"ref31"},{"key":"ref32","first-page":"1","article-title":"C2Miner: Discovering live IoT C2 servers from discarded malware binaries","author":"Xu","year":"2023","journal-title":"ICC"},{"article-title":"Botnet defense system with white-hat worms: An agentoriented Petri net approach","year":"2018","author":"Yamaguchi","key":"ref33"},{"article-title":"A basic command and control strategy in botnet defense system","year":"2020","author":"Morikawa","key":"ref34"}],"event":{"name":"2025 21st International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2025,10,27]]},"location":"Bologna, Italy","end":{"date-parts":[[2025,10,31]]}},"container-title":["2025 21st International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11297200\/11297407\/11297569.pdf?arnumber=11297569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:21:44Z","timestamp":1766470904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11297569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":34,"URL":"https:\/\/doi.org\/10.23919\/cnsm67658.2025.11297569","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]}}}