{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:46Z","timestamp":1767339826581,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research on the Key Technology of Endogenous Security Switches","award":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"],"award-info":[{"award-number":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"]}]},{"name":"New Network Equipment Based on Independent Programmable Chips","award":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"],"award-info":[{"award-number":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"]}]},{"name":"2020 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China","award":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"],"award-info":[{"award-number":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"]}]},{"name":"Fundamental Research Fund for the Central Universities","award":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"],"award-info":[{"award-number":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"]}]},{"name":"2019 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China","award":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"],"award-info":[{"award-number":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"]}]},{"name":"Jiangsu Province Modern Education Technology Research Project","award":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"],"award-info":[{"award-number":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"]}]},{"name":"National Vocational Education Teacher Enterprise Practice Base \u201cIntegration of Industry and Education\u201d Special Project (Study on Evaluation Standard of Artificial Intelligence Vocational Skilled Level)","award":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"],"award-info":[{"award-number":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"]}]},{"name":"Scientific research project of Nanjing Vocational University of Industry Technology","award":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"],"award-info":[{"award-number":["2020YFB1804604","2020YFB1804600","30918012204","30920041112","84365","2020SKYJ03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Axioms"],"abstract":"<jats:p>The DNS firewall plays an important role in network security. It is based on a list of known malicious domain names, and, based on these lists, the firewall blocks communication with these domain names. However, DNS firewalls can only block known malicious domain names, excluding communication with unknown malicious domain names. Prior research has found that machine learning techniques are effective for detecting unknown malicious domain names. However, those methods have limited capabilities to learn from both textual and numerical data. To solve this issue, we present a novel unified learning approach that uses both numerical and textual features of the domain name to classify whether a domain name pair is malicious or not. The experiments were conducted on a benchmark domain names dataset consisting of 90,000 domain names. The experimental results show that the proposed approach performs significantly better than the six comparative methods in terms of accuracy, precision, recall, and F1-Score.<\/jats:p>","DOI":"10.3390\/axioms12050458","type":"journal-article","created":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T01:34:26Z","timestamp":1683596066000},"page":"458","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Unified Learning Approach for Malicious Domain Name Detection"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2356-0361","authenticated-orcid":false,"given":"Atif Ali","family":"Wagan","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0998-1517","authenticated-orcid":false,"given":"Qianmu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China"}]},{"given":"Zubair","family":"Zaland","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Balochistan University of Information Technology Engineering and Management Sciences, Quetta 87300, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9163-0259","authenticated-orcid":false,"given":"Shah","family":"Marjan","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Balochistan University of Information Technology Engineering and Management Sciences, Quetta 87300, Pakistan"}]},{"given":"Dadan Khan","family":"Bozdar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Balochistan University of Information Technology Engineering and Management Sciences, Quetta 87300, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0749-4501","authenticated-orcid":false,"given":"Aamir","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Muhammad Nawaz Shareef University of Agriculture Multan, Multan 60000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9660-8480","authenticated-orcid":false,"given":"Aamir Mehmood","family":"Mirza","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Balochistan University of Information Technology Engineering and Management Sciences, Quetta 87300, Pakistan"}]},{"given":"Mehmood","family":"Baryalai","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Balochistan University of Information Technology Engineering and Management Sciences, Quetta 87300, Pakistan"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Liu, A.X. (2010). Firewall Design and Analysis, World Scientific.","DOI":"10.1142\/7229"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Marques, C., Malta, S., and Magalh\u00e3es, J. (2021). DNS Firewall Based on Machine Learning. Future Internet, 13.","DOI":"10.3390\/fi13120309"},{"key":"ref_3","unstructured":"Zhang, J., Porras, P., and Ullrich, J. (August, January 28). Highly predictive blacklisting. Proceedings of the 17th Conference on Security Symposium, San Jose, CA, USA."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Prakash, P., Kumar, M., Kompella, R.R., and Gupta, M. (2010, January 14\u201319). PhishNet: Predictive Blacklisting to Detect Phishing Attacks. Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Akiyama, M., Yagi, T., and Itoh, M. (2011, January 18\u201321). Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. Proceedings of the 2011 IEEE\/IPSJ International Symposium on Applications and the Internet, Munich, Germany.","DOI":"10.1109\/SAINT.2011.11"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Fukushima, Y., Hori, Y., and Sakurai, K. (2011, January 16\u201318). Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration. Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China.","DOI":"10.1109\/TrustCom.2011.46"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1587\/transinf.2015ICP0027","article-title":"Automating URL Blacklist Generation with Similarity Search Approach","volume":"E99.D","author":"Sun","year":"2016","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_8","unstructured":"Saxe, J., and Berlin, K. (2017). eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"29891","DOI":"10.1109\/ACCESS.2019.2895751","article-title":"Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_10","first-page":"399","article-title":"A Convolution-Based System for Malicious URLs Detection","volume":"62","author":"Luo","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref_11","first-page":"102967","article-title":"SeizeMaliciousURL: A novel learning approach to detect malicious URLs","volume":"62","author":"Mondal","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long Short-Term Memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"ref_13","unstructured":"(2022, December 16). sklearn.preprocessing.LabelEncoder. Scikit-Learn. Available online: https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.preprocessing.LabelEncoder.html."},{"key":"ref_14","unstructured":"(2022, February 26). sklearn.preprocessing.MinMaxScaler. Scikit-Learn. Available online: https:\/\/scikit-learn\/stable\/modules\/generated\/sklearn.preprocessing.MinMaxScaler.html."},{"key":"ref_15","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref_16","unstructured":"Nair, V., and Hinton, G.E. (2010, January 21\u201324). Rectified linear units improve restricted boltzmann machines. Proceedings of the 27th International Conference on International Conference on Machine Learning, Haifa, Israel."},{"key":"ref_17","unstructured":"Bengio, Y., and LeCun, Y. (2015, January 7\u20139). Adam: A Method for Stochastic Optimization. Proceedings of the 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA. Available online: http:\/\/arxiv.org\/abs\/1412.6980."},{"key":"ref_18","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning, MIT Press."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"107342","DOI":"10.1016\/j.dib.2021.107342","article-title":"DNS dataset for malicious domains detection","volume":"38","author":"Marques","year":"2021","journal-title":"Data Brief"},{"key":"ref_20","unstructured":"(2023, March 27). Wayback Machine. Available online: https:\/\/web.archive.org\/web\/20220615132544\/http:\/\/datajobstest.com\/data-science-repo\/LDA-Primer-[Balakrishnama-and-Ganapathiraju].pdf."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/TNN.2002.806647","article-title":"Face recognition using LDA-based algorithms","volume":"14","author":"Lu","year":"2003","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s10916-019-1504-1","article-title":"Automatic Detection of Epileptic Seizures in EEG Using Sparse CSP and Fisher Linear Discrimination Analysis Algorithm","volume":"44","author":"Fu","year":"2020","journal-title":"J. Med. Syst."},{"key":"ref_23","first-page":"43","article-title":"Palm vein recognition based on 2D-discrete wavelet transform and linear discrimination analysis","volume":"6","author":"Elnasir","year":"2014","journal-title":"Int. J. Adv. Soft Comput. Appl."},{"key":"ref_24","unstructured":"(2022, February 26). 1.4. Support Vector Machines. Scikit-Learn. Available online: https:\/\/scikit-learn\/stable\/modules\/svm.html."},{"key":"ref_25","unstructured":"(2023, March 27). kNN Definition|DeepAI. Available online: https:\/\/web.archive.org\/web\/20220701054511\/https:\/\/deepai.org\/machine-learning-glossary-and-terms\/kNN."},{"key":"ref_26","unstructured":"Hassanat, A.B., Abbadi, M.A., Altarawneh, G.A., and Alhasanat, A.A. (2014). Solving the problem of the K parameter in the KNN classifier using an ensemble learning approach. arXiv."},{"key":"ref_27","unstructured":"(2023, March 27). Sklearn.Neighbors.KNeighborsClassifier\u2014Scikit-Learn 1.2.2 Documentation. Available online: https:\/\/web.archive.org\/web\/20230315064604\/https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.neighbors.KNeighborsClassifier.html."},{"key":"ref_28","unstructured":"(2023, March 27). Advantages and Disadvantages of Linear Regression. Available online: https:\/\/web.archive.org\/web\/20230111220233\/https:\/\/iq.opengenus.org\/advantages-and-disadvantages-of-linear-regression\/."},{"key":"ref_29","unstructured":"(2023, March 27). 1.9. Naive Bayes\u2014Scikit-Learn 1.2.1 Documentation. Available online: https:\/\/web.archive.org\/web\/20230307185232\/https:\/\/scikit-learn.org\/stable\/modules\/naive_bayes.html."},{"key":"ref_30","unstructured":"(2023, March 27). 1.10. Decision Trees\u2014Scikit-Learn 1.2.2 Documentation. Available online: https:\/\/web.archive.org\/web\/20230320174546\/https:\/\/scikit-learn.org\/stable\/modules\/tree.html."},{"key":"ref_31","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."}],"container-title":["Axioms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2075-1680\/12\/5\/458\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:31:49Z","timestamp":1760124709000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2075-1680\/12\/5\/458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,9]]},"references-count":31,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["axioms12050458"],"URL":"https:\/\/doi.org\/10.3390\/axioms12050458","relation":{},"ISSN":["2075-1680"],"issn-type":[{"type":"electronic","value":"2075-1680"}],"subject":[],"published":{"date-parts":[[2023,5,9]]}}}