Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning Technique Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.22624/aims/csean-smart2023p4
Prior to now, cyber attackers use malwares with hard-coded domain names stored in the malware binaries that communicate with a command and control (C&C) servers to launch cyber-attacks on their victim computers. Malware attacks such as botnets and ransomwares are some of the most prevalent forms of these attacks. As soon as a system is infected with a malware (either a botnet or a ransomware), one of the most essential components is to establish a secured communication with the botmaster (i.e., the malware author), through a C&C server. However, with a simple reverse engineering technique, cyber security experts could detect and block these domain names, hence, denying them the ability to communicate with the C&C servers and from receiving further instructions from the botmaster. This led to cyber criminals developing the Domain Generation Algorithm (DGA) technique, which algorithmically generate thousands or more candidate’s domain names for communication with the C&C server, thereby obfuscating the domain names of these malwares and making it difficult for cyber security experts to detect or block these domain names. This paper therefore proposes an ensemble machine learning technique for the detection and classification of algorithmically generated domain names (AGDNs) leveraging the combined strength of 4 different machine learning algorithms: Naïve Bayes, SVM, Random Forest and CART. The models were trained twice, first with 4 features and thereafter with 10 features. In order to effectively utilise the result of the predictions, we used a voting-based ensemble approach, where the final classification is decided by the majority vote of the algorithms. Result of the research shows that the Naïve Bayes model performed better than all the other models with an accuracy of 97.54% when trained with 10 features and 95.99% when trained with 4 features. Keywords: WSN, DDoS, Intrusion Detection System, Random Forest, Machine Learning. Proceedings Citation Format Abdullahi, S.M., Mohammed, A., Ibrahim, R.Y. & Shamsuddeen, A. (2023): Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning Technique. Proceedings of the Cyber Secure Nigeria Conference. Nigerian Army Resource Centre (NARC) Abuja, Nigeria. 11-12th July, 2023. Pp 27-34. https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P2.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.22624/aims/csean-smart2023p4
- https://doi.org/10.22624/aims/csean-smart2023p4
- OA Status
- bronze
- References
- 19
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4383652468
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4383652468Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.22624/aims/csean-smart2023p4Digital Object Identifier
- Title
-
Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning TechniqueWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-07-08Full publication date if available
- Authors
-
S.M. Abdullahi, Alaa Hamid Mohammed, Rauf Ibrahim, A. S. ShamsuddeenList of authors in order
- Landing page
-
https://doi.org/10.22624/aims/csean-smart2023p4Publisher landing page
- PDF URL
-
https://doi.org/10.22624/aims/csean-smart2023p4Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.22624/aims/csean-smart2023p4Direct OA link when available
- Concepts
-
Malware, Computer science, Botnet, Domain (mathematical analysis), Random forest, Block (permutation group theory), Computer security, Ransomware, Artificial intelligence, Machine learning, Server, Naive Bayes classifier, Command and control, Support vector machine, Computer network, World Wide Web, Geometry, Mathematics, Mathematical analysis, The Internet, TelecommunicationsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
19Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4383652468 |
|---|---|
| doi | https://doi.org/10.22624/aims/csean-smart2023p4 |
| ids.doi | https://doi.org/10.22624/aims/csean-smart2023p4 |
| ids.openalex | https://openalex.org/W4383652468 |
| fwci | 0.0 |
| type | article |
| title | Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning Technique |
| biblio.issue | 2 |
| biblio.volume | 2 |
| biblio.last_page | 34 |
| biblio.first_page | 27 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9984999895095825 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T11512 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9947999715805054 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Anomaly Detection Techniques and Applications |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C541664917 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8456342220306396 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q14001 |
| concepts[0].display_name | Malware |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7660371661186218 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C22735295 |
| concepts[2].level | 3 |
| concepts[2].score | 0.6837592124938965 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q317671 |
| concepts[2].display_name | Botnet |
| concepts[3].id | https://openalex.org/C36503486 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6296091675758362 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q11235244 |
| concepts[3].display_name | Domain (mathematical analysis) |
| concepts[4].id | https://openalex.org/C169258074 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5631552934646606 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q245748 |
| concepts[4].display_name | Random forest |
| concepts[5].id | https://openalex.org/C2777210771 |
| concepts[5].level | 2 |
| concepts[5].score | 0.554854691028595 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q4927124 |
| concepts[5].display_name | Block (permutation group theory) |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.5329725742340088 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C2777667771 |
| concepts[7].level | 3 |
| concepts[7].score | 0.5182049870491028 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q926331 |
| concepts[7].display_name | Ransomware |
| concepts[8].id | https://openalex.org/C154945302 |
| concepts[8].level | 1 |
| concepts[8].score | 0.5118688941001892 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[8].display_name | Artificial intelligence |
| concepts[9].id | https://openalex.org/C119857082 |
| concepts[9].level | 1 |
| concepts[9].score | 0.48846426606178284 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[9].display_name | Machine learning |
| concepts[10].id | https://openalex.org/C93996380 |
| concepts[10].level | 2 |
| concepts[10].score | 0.4702519178390503 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q44127 |
| concepts[10].display_name | Server |
| concepts[11].id | https://openalex.org/C52001869 |
| concepts[11].level | 3 |
| concepts[11].score | 0.45397520065307617 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q812530 |
| concepts[11].display_name | Naive Bayes classifier |
| concepts[12].id | https://openalex.org/C506615639 |
| concepts[12].level | 2 |
| concepts[12].score | 0.4465048611164093 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q21662260 |
| concepts[12].display_name | Command and control |
| concepts[13].id | https://openalex.org/C12267149 |
| concepts[13].level | 2 |
| concepts[13].score | 0.41783973574638367 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q282453 |
| concepts[13].display_name | Support vector machine |
| concepts[14].id | https://openalex.org/C31258907 |
| concepts[14].level | 1 |
| concepts[14].score | 0.13151651620864868 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[14].display_name | Computer network |
| concepts[15].id | https://openalex.org/C136764020 |
| concepts[15].level | 1 |
| concepts[15].score | 0.12679192423820496 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[15].display_name | World Wide Web |
| concepts[16].id | https://openalex.org/C2524010 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[16].display_name | Geometry |
| concepts[17].id | https://openalex.org/C33923547 |
| concepts[17].level | 0 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[17].display_name | Mathematics |
| concepts[18].id | https://openalex.org/C134306372 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[18].display_name | Mathematical analysis |
| concepts[19].id | https://openalex.org/C110875604 |
| concepts[19].level | 2 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[19].display_name | The Internet |
| concepts[20].id | https://openalex.org/C76155785 |
| concepts[20].level | 1 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[20].display_name | Telecommunications |
| keywords[0].id | https://openalex.org/keywords/malware |
| keywords[0].score | 0.8456342220306396 |
| keywords[0].display_name | Malware |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7660371661186218 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/botnet |
| keywords[2].score | 0.6837592124938965 |
| keywords[2].display_name | Botnet |
| keywords[3].id | https://openalex.org/keywords/domain |
| keywords[3].score | 0.6296091675758362 |
| keywords[3].display_name | Domain (mathematical analysis) |
| keywords[4].id | https://openalex.org/keywords/random-forest |
| keywords[4].score | 0.5631552934646606 |
| keywords[4].display_name | Random forest |
| keywords[5].id | https://openalex.org/keywords/block |
| keywords[5].score | 0.554854691028595 |
| keywords[5].display_name | Block (permutation group theory) |
| keywords[6].id | https://openalex.org/keywords/computer-security |
| keywords[6].score | 0.5329725742340088 |
| keywords[6].display_name | Computer security |
| keywords[7].id | https://openalex.org/keywords/ransomware |
| keywords[7].score | 0.5182049870491028 |
| keywords[7].display_name | Ransomware |
| keywords[8].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[8].score | 0.5118688941001892 |
| keywords[8].display_name | Artificial intelligence |
| keywords[9].id | https://openalex.org/keywords/machine-learning |
| keywords[9].score | 0.48846426606178284 |
| keywords[9].display_name | Machine learning |
| keywords[10].id | https://openalex.org/keywords/server |
| keywords[10].score | 0.4702519178390503 |
| keywords[10].display_name | Server |
| keywords[11].id | https://openalex.org/keywords/naive-bayes-classifier |
| keywords[11].score | 0.45397520065307617 |
| keywords[11].display_name | Naive Bayes classifier |
| keywords[12].id | https://openalex.org/keywords/command-and-control |
| keywords[12].score | 0.4465048611164093 |
| keywords[12].display_name | Command and control |
| keywords[13].id | https://openalex.org/keywords/support-vector-machine |
| keywords[13].score | 0.41783973574638367 |
| keywords[13].display_name | Support vector machine |
| keywords[14].id | https://openalex.org/keywords/computer-network |
| keywords[14].score | 0.13151651620864868 |
| keywords[14].display_name | Computer network |
| keywords[15].id | https://openalex.org/keywords/world-wide-web |
| keywords[15].score | 0.12679192423820496 |
| keywords[15].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.22624/aims/csean-smart2023p4 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210231064 |
| locations[0].source.issn | 2488-8699 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2488-8699 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Advances in Multidisciplinary & Scientific Research Journal Publication |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.22624/aims/csean-smart2023p4 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Advances in Multidisciplinary and scientific Research Journal Publication |
| locations[0].landing_page_url | http://doi.org/10.22624/aims/csean-smart2023p4 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5112451889 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | S.M. Abdullahi |
| authorships[0].countries | NG, US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210127432 |
| authorships[0].affiliations[0].raw_affiliation_string | (SMART) |
| authorships[0].affiliations[1].raw_affiliation_string | ICT University Foundations USA |
| authorships[0].affiliations[2].institution_ids | https://openalex.org/I3131952115 |
| authorships[0].affiliations[2].raw_affiliation_string | Department of Cyber Security, Air Force Institute of Technology (AFIT), Kaduna -Nigeria. |
| authorships[0].affiliations[3].raw_affiliation_string | Iya Abubakar Institute of Computing & ICT, ABU -Zaria, Nigeria. |
| authorships[0].affiliations[4].raw_affiliation_string | Dept of Computer Science Education, Isa Kaita College of Education, Dutsinma-Katsina, Nigeria. |
| authorships[0].affiliations[5].institution_ids | https://openalex.org/I12789410 |
| authorships[0].affiliations[5].raw_affiliation_string | Department of Computer Science, Ahmadu Bello University, Zaria, Nigeria. |
| authorships[0].affiliations[6].raw_affiliation_string | Faculty of Computational Sciences & Informatics -Academic City University College, Accra, Ghana SMART Scientific Projects & Research Consortium (SMART SPaRC) Sekinah-Hope Foundation for Female STEM Education |
| authorships[0].institutions[0].id | https://openalex.org/I12789410 |
| authorships[0].institutions[0].ror | https://ror.org/019apvn83 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I12789410 |
| authorships[0].institutions[0].country_code | NG |
| authorships[0].institutions[0].display_name | Ahmadu Bello University |
| authorships[0].institutions[1].id | https://openalex.org/I3131952115 |
| authorships[0].institutions[1].ror | https://ror.org/00f3apt60 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I3131952115 |
| authorships[0].institutions[1].country_code | NG |
| authorships[0].institutions[1].display_name | Kaduna Polytechnic |
| authorships[0].institutions[2].id | https://openalex.org/I4210127432 |
| authorships[0].institutions[2].ror | https://ror.org/0345xq683 |
| authorships[0].institutions[2].type | nonprofit |
| authorships[0].institutions[2].lineage | https://openalex.org/I4210127432 |
| authorships[0].institutions[2].country_code | US |
| authorships[0].institutions[2].display_name | SMART Reading |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | S.M. Abdullahi |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | (SMART), Department of Computer Science, Ahmadu Bello University, Zaria, Nigeria., Department of Cyber Security, Air Force Institute of Technology (AFIT), Kaduna -Nigeria., Dept of Computer Science Education, Isa Kaita College of Education, Dutsinma-Katsina, Nigeria., Faculty of Computational Sciences & Informatics -Academic City University College, Accra, Ghana SMART Scientific Projects & Research Consortium (SMART SPaRC) Sekinah-Hope Foundation for Female STEM Education, ICT University Foundations USA, Iya Abubakar Institute of Computing & ICT, ABU -Zaria, Nigeria. |
| authorships[1].author.id | https://openalex.org/A5075063819 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-5197-492X |
| authorships[1].author.display_name | Alaa Hamid Mohammed |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | A. Mohammed |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5110736994 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Rauf Ibrahim |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | R.Y. Ibrahim |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5092430662 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | A. S. Shamsuddeen |
| authorships[3].countries | NG, US |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I12789410 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computer Science, Ahmadu Bello University, Zaria, Nigeria. |
| authorships[3].affiliations[1].raw_affiliation_string | Faculty of Computational Sciences & Informatics -Academic City University College, Accra, Ghana SMART Scientific Projects & Research Consortium (SMART SPaRC) Sekinah-Hope Foundation for Female STEM Education |
| authorships[3].affiliations[2].raw_affiliation_string | Iya Abubakar Institute of Computing & ICT, ABU -Zaria, Nigeria. |
| authorships[3].affiliations[3].raw_affiliation_string | Dept of Computer Science Education, Isa Kaita College of Education, Dutsinma-Katsina, Nigeria. |
| authorships[3].affiliations[4].institution_ids | https://openalex.org/I4210127432 |
| authorships[3].affiliations[4].raw_affiliation_string | (SMART) |
| authorships[3].affiliations[5].raw_affiliation_string | ICT University Foundations USA |
| authorships[3].affiliations[6].institution_ids | https://openalex.org/I3131952115 |
| authorships[3].affiliations[6].raw_affiliation_string | Department of Cyber Security, Air Force Institute of Technology (AFIT), Kaduna -Nigeria. |
| authorships[3].institutions[0].id | https://openalex.org/I12789410 |
| authorships[3].institutions[0].ror | https://ror.org/019apvn83 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I12789410 |
| authorships[3].institutions[0].country_code | NG |
| authorships[3].institutions[0].display_name | Ahmadu Bello University |
| authorships[3].institutions[1].id | https://openalex.org/I3131952115 |
| authorships[3].institutions[1].ror | https://ror.org/00f3apt60 |
| authorships[3].institutions[1].type | education |
| authorships[3].institutions[1].lineage | https://openalex.org/I3131952115 |
| authorships[3].institutions[1].country_code | NG |
| authorships[3].institutions[1].display_name | Kaduna Polytechnic |
| authorships[3].institutions[2].id | https://openalex.org/I4210127432 |
| authorships[3].institutions[2].ror | https://ror.org/0345xq683 |
| authorships[3].institutions[2].type | nonprofit |
| authorships[3].institutions[2].lineage | https://openalex.org/I4210127432 |
| authorships[3].institutions[2].country_code | US |
| authorships[3].institutions[2].display_name | SMART Reading |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | A. S. Shamsuddeen |
| authorships[3].is_corresponding | True |
| authorships[3].raw_affiliation_strings | (SMART), Department of Computer Science, Ahmadu Bello University, Zaria, Nigeria., Department of Cyber Security, Air Force Institute of Technology (AFIT), Kaduna -Nigeria., Dept of Computer Science Education, Isa Kaita College of Education, Dutsinma-Katsina, Nigeria., Faculty of Computational Sciences & Informatics -Academic City University College, Accra, Ghana SMART Scientific Projects & Research Consortium (SMART SPaRC) Sekinah-Hope Foundation for Female STEM Education, ICT University Foundations USA, Iya Abubakar Institute of Computing & ICT, ABU -Zaria, Nigeria. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.22624/aims/csean-smart2023p4 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-07-09T00:00:00 |
| display_name | Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning Technique |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2929621094, https://openalex.org/W1996006176, https://openalex.org/W4285325964, https://openalex.org/W86804927, https://openalex.org/W2898126008, https://openalex.org/W1583098994, https://openalex.org/W2386447999, https://openalex.org/W2130216882, https://openalex.org/W2091214382, https://openalex.org/W2376288852 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.22624/aims/csean-smart2023p4 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210231064 |
| best_oa_location.source.issn | 2488-8699 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2488-8699 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Advances in Multidisciplinary & Scientific Research Journal Publication |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.22624/aims/csean-smart2023p4 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Advances in Multidisciplinary and scientific Research Journal Publication |
| best_oa_location.landing_page_url | http://doi.org/10.22624/aims/csean-smart2023p4 |
| primary_location.id | doi:10.22624/aims/csean-smart2023p4 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210231064 |
| primary_location.source.issn | 2488-8699 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2488-8699 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Advances in Multidisciplinary & Scientific Research Journal Publication |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.22624/aims/csean-smart2023p4 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Advances in Multidisciplinary and scientific Research Journal Publication |
| primary_location.landing_page_url | http://doi.org/10.22624/aims/csean-smart2023p4 |
| publication_date | 2023-07-08 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2742673065, https://openalex.org/W2953040712, https://openalex.org/W2962727190, https://openalex.org/W2904049496, https://openalex.org/W3025161810, https://openalex.org/W3003429233, https://openalex.org/W2967189403, https://openalex.org/W3037163353, https://openalex.org/W2912755644, https://openalex.org/W4205529598, https://openalex.org/W2998701638, https://openalex.org/W3122189786, https://openalex.org/W3034138874, https://openalex.org/W3014018380, https://openalex.org/W4220830245, https://openalex.org/W3130255873, https://openalex.org/W2487301225, https://openalex.org/W3195903966, https://openalex.org/W2940958568 |
| referenced_works_count | 19 |
| abstract_inverted_index.4 | 199, 218, 286 |
| abstract_inverted_index.a | 19, 52, 57, 60, 63, 74, 85, 90, 237 |
| abstract_inverted_index.10 | 223, 279 |
| abstract_inverted_index.A. | 309 |
| abstract_inverted_index.As | 49 |
| abstract_inverted_index.In | 225 |
| abstract_inverted_index.Pp | 339 |
| abstract_inverted_index.an | 178, 272 |
| abstract_inverted_index.as | 35, 51 |
| abstract_inverted_index.by | 247 |
| abstract_inverted_index.in | 12 |
| abstract_inverted_index.is | 54, 71, 245 |
| abstract_inverted_index.it | 161 |
| abstract_inverted_index.of | 41, 46, 66, 156, 188, 198, 232, 251, 255, 274, 312, 323 |
| abstract_inverted_index.on | 28 |
| abstract_inverted_index.or | 62, 140, 169 |
| abstract_inverted_index.to | 1, 25, 72, 110, 126, 167, 227 |
| abstract_inverted_index.we | 235 |
| abstract_inverted_index.A., | 304 |
| abstract_inverted_index.The | 211 |
| abstract_inverted_index.all | 267 |
| abstract_inverted_index.and | 21, 37, 100, 116, 159, 186, 209, 220, 281 |
| abstract_inverted_index.are | 39 |
| abstract_inverted_index.for | 145, 163, 183 |
| abstract_inverted_index.led | 125 |
| abstract_inverted_index.one | 65 |
| abstract_inverted_index.the | 13, 42, 67, 78, 81, 108, 113, 122, 130, 148, 153, 184, 195, 230, 233, 242, 248, 252, 256, 260, 268, 324 |
| abstract_inverted_index.use | 5 |
| abstract_inverted_index.Army | 330 |
| abstract_inverted_index.R.Y. | 306 |
| abstract_inverted_index.SVM, | 206 |
| abstract_inverted_index.This | 124, 174 |
| abstract_inverted_index.WSN, | 289 |
| abstract_inverted_index.from | 117, 121 |
| abstract_inverted_index.more | 141 |
| abstract_inverted_index.most | 43, 68 |
| abstract_inverted_index.now, | 2 |
| abstract_inverted_index.some | 40 |
| abstract_inverted_index.soon | 50 |
| abstract_inverted_index.such | 34 |
| abstract_inverted_index.than | 266 |
| abstract_inverted_index.that | 16, 259 |
| abstract_inverted_index.them | 107 |
| abstract_inverted_index.used | 236 |
| abstract_inverted_index.vote | 250 |
| abstract_inverted_index.were | 213 |
| abstract_inverted_index.when | 276, 283 |
| abstract_inverted_index.with | 7, 18, 56, 77, 89, 112, 147, 217, 222, 271, 278, 285 |
| abstract_inverted_index.& | 307 |
| abstract_inverted_index.(DGA) | 134 |
| abstract_inverted_index.2023. | 338 |
| abstract_inverted_index.Bayes | 262 |
| abstract_inverted_index.CART. | 210 |
| abstract_inverted_index.Cyber | 325 |
| abstract_inverted_index.DDoS, | 290 |
| abstract_inverted_index.July, | 337 |
| abstract_inverted_index.Names | 316 |
| abstract_inverted_index.Prior | 0 |
| abstract_inverted_index.S.M., | 302 |
| abstract_inverted_index.block | 101, 170 |
| abstract_inverted_index.could | 98 |
| abstract_inverted_index.cyber | 3, 95, 127, 164 |
| abstract_inverted_index.final | 243 |
| abstract_inverted_index.first | 216 |
| abstract_inverted_index.forms | 45 |
| abstract_inverted_index.model | 263 |
| abstract_inverted_index.names | 10, 144, 155, 192 |
| abstract_inverted_index.order | 226 |
| abstract_inverted_index.other | 269 |
| abstract_inverted_index.paper | 175 |
| abstract_inverted_index.shows | 258 |
| abstract_inverted_index.their | 29 |
| abstract_inverted_index.these | 47, 102, 157, 171 |
| abstract_inverted_index.using | 317 |
| abstract_inverted_index.where | 241 |
| abstract_inverted_index.which | 136 |
| abstract_inverted_index.(NARC) | 333 |
| abstract_inverted_index.(i.e., | 80 |
| abstract_inverted_index.27-34. | 340 |
| abstract_inverted_index.95.99% | 282 |
| abstract_inverted_index.97.54% | 275 |
| abstract_inverted_index.Abuja, | 334 |
| abstract_inverted_index.Bayes, | 205 |
| abstract_inverted_index.Centre | 332 |
| abstract_inverted_index.Domain | 131, 315 |
| abstract_inverted_index.Forest | 208 |
| abstract_inverted_index.Format | 300 |
| abstract_inverted_index.Naïve | 204, 261 |
| abstract_inverted_index.Random | 207, 294 |
| abstract_inverted_index.Result | 254 |
| abstract_inverted_index.Secure | 326 |
| abstract_inverted_index.better | 265 |
| abstract_inverted_index.botnet | 61 |
| abstract_inverted_index.detect | 99, 168 |
| abstract_inverted_index.domain | 9, 103, 143, 154, 172, 191 |
| abstract_inverted_index.hence, | 105 |
| abstract_inverted_index.launch | 26 |
| abstract_inverted_index.making | 160 |
| abstract_inverted_index.models | 212, 270 |
| abstract_inverted_index.names, | 104 |
| abstract_inverted_index.names. | 173 |
| abstract_inverted_index.result | 231 |
| abstract_inverted_index.simple | 91 |
| abstract_inverted_index.stored | 11 |
| abstract_inverted_index.system | 53 |
| abstract_inverted_index.twice, | 215 |
| abstract_inverted_index.victim | 30 |
| abstract_inverted_index.(2023): | 310 |
| abstract_inverted_index.(AGDNs) | 193 |
| abstract_inverted_index.(either | 59 |
| abstract_inverted_index.11-12th | 336 |
| abstract_inverted_index.C&C | 86, 114, 149 |
| abstract_inverted_index.Forest, | 295 |
| abstract_inverted_index.Machine | 296, 319 |
| abstract_inverted_index.Malware | 32 |
| abstract_inverted_index.Nigeria | 327 |
| abstract_inverted_index.System, | 293 |
| abstract_inverted_index.ability | 109 |
| abstract_inverted_index.attacks | 33 |
| abstract_inverted_index.botnets | 36 |
| abstract_inverted_index.command | 20 |
| abstract_inverted_index.control | 22 |
| abstract_inverted_index.decided | 246 |
| abstract_inverted_index.denying | 106 |
| abstract_inverted_index.experts | 97, 166 |
| abstract_inverted_index.further | 119 |
| abstract_inverted_index.machine | 180, 201 |
| abstract_inverted_index.malware | 14, 58, 82 |
| abstract_inverted_index.reverse | 92 |
| abstract_inverted_index.secured | 75 |
| abstract_inverted_index.server, | 150 |
| abstract_inverted_index.server. | 87 |
| abstract_inverted_index.servers | 24, 115 |
| abstract_inverted_index.thereby | 151 |
| abstract_inverted_index.through | 84 |
| abstract_inverted_index.trained | 214, 277, 284 |
| abstract_inverted_index.utilise | 229 |
| abstract_inverted_index.Citation | 299 |
| abstract_inverted_index.Ensemble | 318 |
| abstract_inverted_index.However, | 88 |
| abstract_inverted_index.Ibrahim, | 305 |
| abstract_inverted_index.Learning | 320 |
| abstract_inverted_index.Nigeria. | 335 |
| abstract_inverted_index.Nigerian | 329 |
| abstract_inverted_index.Resource | 331 |
| abstract_inverted_index.accuracy | 273 |
| abstract_inverted_index.attacks. | 48 |
| abstract_inverted_index.author), | 83 |
| abstract_inverted_index.binaries | 15 |
| abstract_inverted_index.combined | 196 |
| abstract_inverted_index.ensemble | 179, 239 |
| abstract_inverted_index.features | 219, 280 |
| abstract_inverted_index.generate | 138 |
| abstract_inverted_index.infected | 55 |
| abstract_inverted_index.learning | 181, 202 |
| abstract_inverted_index.majority | 249 |
| abstract_inverted_index.malwares | 6, 158 |
| abstract_inverted_index.proposes | 177 |
| abstract_inverted_index.research | 257 |
| abstract_inverted_index.security | 96, 165 |
| abstract_inverted_index.strength | 197 |
| abstract_inverted_index.(C&C) | 23 |
| abstract_inverted_index.Algorithm | 133 |
| abstract_inverted_index.Detection | 292, 311 |
| abstract_inverted_index.Generated | 314 |
| abstract_inverted_index.Intrusion | 291 |
| abstract_inverted_index.Keywords: | 288 |
| abstract_inverted_index.Learning. | 297 |
| abstract_inverted_index.Mohammed, | 303 |
| abstract_inverted_index.approach, | 240 |
| abstract_inverted_index.attackers | 4 |
| abstract_inverted_index.botmaster | 79 |
| abstract_inverted_index.criminals | 128 |
| abstract_inverted_index.detection | 185 |
| abstract_inverted_index.different | 200 |
| abstract_inverted_index.difficult | 162 |
| abstract_inverted_index.essential | 69 |
| abstract_inverted_index.establish | 73 |
| abstract_inverted_index.features. | 224, 287 |
| abstract_inverted_index.generated | 190 |
| abstract_inverted_index.performed | 264 |
| abstract_inverted_index.prevalent | 44 |
| abstract_inverted_index.receiving | 118 |
| abstract_inverted_index.technique | 182 |
| abstract_inverted_index.therefore | 176 |
| abstract_inverted_index.thousands | 139 |
| abstract_inverted_index.Abdullahi, | 301 |
| abstract_inverted_index.Generation | 132 |
| abstract_inverted_index.Technique. | 321 |
| abstract_inverted_index.botmaster. | 123 |
| abstract_inverted_index.components | 70 |
| abstract_inverted_index.computers. | 31 |
| abstract_inverted_index.developing | 129 |
| abstract_inverted_index.hard-coded | 8 |
| abstract_inverted_index.leveraging | 194 |
| abstract_inverted_index.technique, | 94, 135 |
| abstract_inverted_index.thereafter | 221 |
| abstract_inverted_index.Conference. | 328 |
| abstract_inverted_index.Proceedings | 298, 322 |
| abstract_inverted_index.algorithms. | 253 |
| abstract_inverted_index.algorithms: | 203 |
| abstract_inverted_index.communicate | 17, 111 |
| abstract_inverted_index.effectively | 228 |
| abstract_inverted_index.engineering | 93 |
| abstract_inverted_index.obfuscating | 152 |
| abstract_inverted_index.ransomwares | 38 |
| abstract_inverted_index.Shamsuddeen, | 308 |
| abstract_inverted_index.instructions | 120 |
| abstract_inverted_index.predictions, | 234 |
| abstract_inverted_index.ransomware), | 64 |
| abstract_inverted_index.voting-based | 238 |
| abstract_inverted_index.candidate’s | 142 |
| abstract_inverted_index.communication | 76, 146 |
| abstract_inverted_index.cyber-attacks | 27 |
| abstract_inverted_index.classification | 187, 244 |
| abstract_inverted_index.Algorithmically | 313 |
| abstract_inverted_index.algorithmically | 137, 189 |
| abstract_inverted_index.dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P2. | 342 |
| abstract_inverted_index.https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ | 341 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5112451889, https://openalex.org/A5092430662 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 4 |
| corresponding_institution_ids | https://openalex.org/I12789410, https://openalex.org/I3131952115, https://openalex.org/I4210127432 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.5600000023841858 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.09915619 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |