Malicious Domain Names Detection Algorithm Based on N-Gram
Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N-Gram method. Each domain name excluding the top-level domain is segme...
Saved in:
| Published in: | Journal of computer networks and communications Vol. 2019; no. 2019; pp. 1 - 9 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Cairo, Egypt
Hindawi Publishing Corporation
01.01.2019
Hindawi John Wiley & Sons, Inc Wiley |
| Subjects: | |
| ISSN: | 2090-7141, 2090-715X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N-Gram method. Each domain name excluding the top-level domain is segmented into substrings according to its domain level with the lengths of 3, 4, 5, 6, and 7. The substring set of the 100,000 domain names is established, and the weight value of a substring is calculated according to its occurrence number in the substring set. To detect a malicious attack, the domain name is also segmented by the N-Gram method and its reputation value is calculated based on the weight values of its substrings. Finally, the judgment of whether the domain name is malicious is made by thresholding. In the experiments on Alexa 2017 and Malware domain list, the proposed detection algorithm yielded an accuracy rate of 94.04%, a false negative rate of 7.42%, and a false positive rate of 6.14%. The time complexity is lower than other popular malicious domain names detection algorithms. |
|---|---|
| AbstractList | Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N-Gram method. Each domain name excluding the top-level domain is segmented into substrings according to its domain level with the lengths of 3, 4, 5, 6, and 7. The substring set of the 100,000 domain names is established, and the weight value of a substring is calculated according to its occurrence number in the substring set. To detect a malicious attack, the domain name is also segmented by the N-Gram method and its reputation value is calculated based on the weight values of its substrings. Finally, the judgment of whether the domain name is malicious is made by thresholding. In the experiments on Alexa 2017 and Malware domain list, the proposed detection algorithm yielded an accuracy rate of 94.04%, a false negative rate of 7.42%, and a false positive rate of 6.14%. The time complexity is lower than other popular malicious domain names detection algorithms. Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N -Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N -Gram method. Each domain name excluding the top-level domain is segmented into substrings according to its domain level with the lengths of 3, 4, 5, 6, and 7. The substring set of the 100,000 domain names is established, and the weight value of a substring is calculated according to its occurrence number in the substring set. To detect a malicious attack, the domain name is also segmented by the N -Gram method and its reputation value is calculated based on the weight values of its substrings. Finally, the judgment of whether the domain name is malicious is made by thresholding. In the experiments on Alexa 2017 and Malware domain list, the proposed detection algorithm yielded an accuracy rate of 94.04%, a false negative rate of 7.42%, and a false positive rate of 6.14%. The time complexity is lower than other popular malicious domain names detection algorithms. |
| Author | Bao, Guangbin Zeng, Xiang-Yan Chang, Zhaobin Hong, Zhao |
| Author_xml | – sequence: 1 fullname: Zeng, Xiang-Yan – sequence: 2 fullname: Bao, Guangbin – sequence: 3 fullname: Chang, Zhaobin – sequence: 4 fullname: Hong, Zhao |
| BookMark | eNqFkM1r3DAQxUXZQtJkbzkXQ4-tE41sWVJvm--FZHtpoTcxlqVEi21tZS8l_320cT4gUDoXjUa_9zS8T2TWh94ScgT0GIDzE0ZBnZQVsFKUH8g-o4rmAvjv2Wtfwh6ZD8OaphJCikrtk--32Hrjw3bIzkOHvs9W2Nl0saM1ow99tmjvQvTjfZed4mCbLI1W-VXE7pB8dNgOdv58HpBflxc_z67zmx9Xy7PFTW5KVo05Aq8Zx8oxcABMGF5I3lgnaW2QshqRNkIUqpFNeq65LVhtlBCVFAJLh8UBWU6-TcC13kTfYXzQAb1-GoR4pzGO3rRWC0WVTD9xdLYErKXitXWlcwKsMg1PXl8mr00Mf7Z2GPU6bGOf1tcMJOPAJasSxSbKxDAM0Tpt_Ii7NMaIvtVA9S5yvYtcP0eeRN_eiV5W_Qf-dcLvfd_gX_8_-vNE28RYh280CMZkVTwC5biXuQ |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3454242 crossref_primary_10_1109_ACCESS_2022_3162588 crossref_primary_10_1007_s12243_024_01043_3 crossref_primary_10_1109_ACCESS_2021_3080456 crossref_primary_10_1155_2019_5217961 crossref_primary_10_1007_s12083_024_01822_8 crossref_primary_10_1109_ACCESS_2025_3608450 crossref_primary_10_1109_TIFS_2022_3183390 crossref_primary_10_1371_journal_pone_0279866 crossref_primary_10_1007_s42979_023_02243_9 crossref_primary_10_26636_jtit_2025_FITCE2024_2033 crossref_primary_10_1080_19393555_2021_1934198 crossref_primary_10_1109_ACCESS_2023_3286313 crossref_primary_10_1109_ACCESS_2019_2940554 |
| Cites_doi | 10.1007/s11063-017-9666-7 10.1016/j.diin.2017.12.002 10.1155/2017/7674594 10.1016/j.comnet.2015.12.008 10.1109/mnet.2013.6423188 10.1109/tnet.2012.2184552 10.1109/lcomm.2013.112413.132231 10.1145/2584679 10.1016/j.diin.2014.11.001 |
| ContentType | Journal Article |
| Copyright | Copyright © 2019 Hong Zhao et al. Copyright © 2019 Hong Zhao et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2019 Hong Zhao et al. – notice: Copyright © 2019 Hong Zhao et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0 |
| DBID | ADJCN AHFXO RHU RHW RHX AAYXX CITATION 3V. 7SC 7SP 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU CWDGH DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U DOA |
| DOI | 10.1155/2019/4612474 |
| DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Electronics & Communications Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Middle East & Africa Database ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences Middle East & Africa Database ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 3 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2090-715X |
| Editor | Chaeikar, Saman S. |
| Editor_xml | – sequence: 1 givenname: Saman S. surname: Chaeikar fullname: Chaeikar, Saman S. |
| EndPage | 9 |
| ExternalDocumentID | oai_doaj_org_article_790986f25afe41ab895bef4ff71e9cd5 10_1155_2019_4612474 1172286 |
| GrantInformation_xml | – fundername: CERNET Innovation Project grantid: NGII20160311; NGII20160112 – fundername: Gansu Science Foundation of China grantid: 18JR3RA156 – fundername: National Natural Science Foundation of China grantid: 51668043; 61262016 |
| GroupedDBID | .4S .DC 0R~ 24P 4.4 5VS 8FE 8FG AAFWJ AAKPC AAMMB ABUWG ACCMX ADBBV ADJCN ADMLS AEFGJ AFKRA AFPKN AGXDD AHFXO AIDQK AIDYY ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CWDGH DWQXO EBS EDO EJD GNUQQ GROUPED_DOAJ H13 HCIFZ IAO ICD IHR IL9 ITC IVC K6V K7- KQ8 OK1 P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC PUEGO Q2X TR2 TUS 3V. AAJEY M0N M~E RHU RHW RHX AAYXX AFFHD ALUQN CITATION 7SC 7SP 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c426t-a15b25a6f21f1127c5385def80bca02baa0d7739d8d112b5e32bc9776877a4fa3 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 20 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000459043000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2090-7141 |
| IngestDate | Fri Oct 03 12:34:30 EDT 2025 Fri Jul 25 20:48:51 EDT 2025 Sat Nov 29 02:31:12 EST 2025 Tue Nov 18 20:51:33 EST 2025 Sun Jun 02 19:19:40 EDT 2024 Thu Sep 25 15:09:55 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2019 |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c426t-a15b25a6f21f1127c5385def80bca02baa0d7739d8d112b5e32bc9776877a4fa3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-1574-979X 0000-0001-8850-0891 0000-0002-5515-6139 0000-0002-9023-338X |
| OpenAccessLink | https://doaj.org/article/790986f25afe41ab895bef4ff71e9cd5 |
| PQID | 2182515826 |
| PQPubID | 237794 |
| PageCount | 9 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_790986f25afe41ab895bef4ff71e9cd5 proquest_journals_2182515826 crossref_citationtrail_10_1155_2019_4612474 crossref_primary_10_1155_2019_4612474 hindawi_primary_10_1155_2019_4612474 emarefa_primary_1172286 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-01-01 |
| PublicationDateYYYYMMDD | 2019-01-01 |
| PublicationDate_xml | – month: 01 year: 2019 text: 2019-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Cairo, Egypt |
| PublicationPlace_xml | – name: Cairo, Egypt – name: New York |
| PublicationTitle | Journal of computer networks and communications |
| PublicationYear | 2019 |
| Publisher | Hindawi Publishing Corporation Hindawi John Wiley & Sons, Inc Wiley |
| Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi – name: John Wiley & Sons, Inc – name: Wiley |
| References | 36 27 (24) 2016; 27 29 19 (16) 2016; 17 (20) 2013; 47 (13) 2017; 38 2 (26) 2017; 45 3 (23) 2018; 35 (1) 2018 5 (17) 2018; 39 6 (10) 2018; 45 8 |
| References_xml | – volume: 47 start-page: 54 issue: 8 year: 2013 ident: 20 publication-title: Journal of Xian Jiaotong University – ident: 8 doi: 10.1007/s11063-017-9666-7 – ident: 27 doi: 10.1016/j.diin.2017.12.002 – volume: 17 start-page: 217 issue: 2 year: 2016 ident: 16 publication-title: Journal Of Internet Technology – ident: 36 doi: 10.1155/2017/7674594 – ident: 19 doi: 10.1016/j.comnet.2015.12.008 – volume: 45 start-page: 1592 issue: 8 year: 2017 ident: 26 publication-title: Computer and Digital Engineering – volume: 27 start-page: 2348 issue: 9 year: 2016 ident: 24 publication-title: Journal of Software – ident: 29 doi: 10.1109/mnet.2013.6423188 – volume: 39 start-page: 15 issue: 7 year: 2018 ident: 17 publication-title: Journal on Communications – ident: 3 doi: 10.1109/tnet.2012.2184552 – volume: 38 start-page: 19 issue: 5 year: 2017 ident: 13 publication-title: Journal on Communications – volume-title: 36th internet security threat report year: 2018 ident: 1 – ident: 2 doi: 10.1109/lcomm.2013.112413.132231 – volume: 35 start-page: 287 issue: 3 year: 2018 ident: 23 publication-title: Computer Simulation – volume: 45 start-page: 231 issue: 2 year: 2018 ident: 10 publication-title: Computer Science – ident: 5 doi: 10.1145/2584679 – ident: 6 doi: 10.1016/j.diin.2014.11.001 |
| SSID | ssj0000778769 ssib044743864 |
| Score | 2.2051282 |
| Snippet | Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is... Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N -Gram... |
| SourceID | doaj proquest crossref hindawi emarefa |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Behavior Blacklisting Computer networks Computer simulation Cybersecurity Domain names International conferences Internet Malware Mathematical analysis Semantics Servers Trademarks URLs Weight |
| SummonAdditionalLinks | – databaseName: Hindawi Publishing Open Access dbid: RHX link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB6VFZV6gVLaskCRD_SEoiaOHdvc2PI6tCuE2mpvkeNHWYndRbsB_j5jrwMqqGqPdiwnmfH4m3Em3wDso31VleUy40ZTDFCYzRSVeRYqXJkKQw4WzyF_fRPDoRyN1EUiSVq8_ISPaIfheaG-MERiJtgKrEgeMrcuz0fdsmHYX3Yk43EDFrgKYzE7mqs8EwUrupT3Z9P9AUaRsz_-mKuxjUD1-iqExffjF9t0xJ7Tt7CWnEZytNTyBrxy03ew3hVkIMk-N-HwO3rVJmS1kuPZBGN-MgxJsOTYtTHjakqOrn_P5uP2akIGCF-WYNcwO5vryXv4eXry4-t5loojZAZBtc10wRvKdeVp4dFnEgZ3Lm6dl3ljdE4brXMrRKmstHi54a6kjUFnr5JCaOZ1-QF609nUbQEprS-414hTgZ3PW21c6Sz6SbnX1DHZh4NOSrVJzOGhgMV1HSMIzusg0zrJtA-fH0ffLBkz_jJuEAT-OCbwXMcO1H2dzKYWKlcS35Fr71ihG6l44zzzXhROGcv78DGp6-le6JJRWfVhP6nvH0-x2-m2Tta7qAOrPfp5GHlt_98sO_AmNJdHM7vQa-e37hOsmrt2vJjvxdX6AOWV21k priority: 102 providerName: Hindawi Publishing – databaseName: Advanced Technologies & Aerospace Database dbid: P5Z link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6VFiQutLwXWuRDOSFrE8eObS6opbQc6KqHgioukeNHu1I3W3YD_H3GXqcVQsChx9iWE2fs-WYmk28AdvF81bUTigprGDoo3FHNVEFjhStbo8vBUxzyyyc5maizM32SA27LnFY56MSkqN3cxhj5ODKNI_aiNfzu6huNVaPi19VcQuMObESWhFi64UR8HfYT5wiPA_t40swSt2eqcscKXVBZ8nLIhRdijFCoxxwRn0v-G0olMv_0x67Ba0SwexfRX_45_UN_J1A63LztcrbgQTZHyd5q_zyENd89gs2h1APJJ_8xvD1Ge93GfFlyMJ-ZaUcmMb2WHPg-5XJ1ZO_yHOfvL2ZkH4HREWya0KOFmT2Bz4cfTt9_pLnsArUI1z01pWiZMHVgZUBrTFrUicL5oIrWmoK1xhROyko75bC7Fb5irUUzslZSGh5M9RTWu3nnnwOpXChFMIiAkfcvOGN95R1aYEUwzHM1gjfDa25s5iSPpTEum-SbCNFEoTRZKCN4fT36asXF8Zdx-1Fi12Mig3ZqmC_Om3wgG6kLrXCNwgTPS9MqLVofeAiy9No6MYJnWd4390Jjj6l6BLtZ_v95iu1B8k3WC8vmRuwv_t39Eu7HyVbBnm1Y7xff_Q7ctT_66XLxKm3zX8C__DY priority: 102 providerName: ProQuest |
| Title | Malicious Domain Names Detection Algorithm Based on N-Gram |
| URI | https://search.emarefa.net/detail/BIM-1172286 https://dx.doi.org/10.1155/2019/4612474 https://www.proquest.com/docview/2182515826 https://doaj.org/article/790986f25afe41ab895bef4ff71e9cd5 |
| Volume | 2019 |
| WOSCitedRecordID | wos000459043000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2090-715X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000778769 issn: 2090-7141 databaseCode: DOA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2090-715X dateEnd: 99991231 omitProxy: false ssIdentifier: ssib044743864 issn: 2090-7141 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2090-715X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000778769 issn: 2090-7141 databaseCode: P5Z dateStart: 20110101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2090-715X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000778769 issn: 2090-7141 databaseCode: K7- dateStart: 20110101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Middle East & Africa Database customDbUrl: eissn: 2090-715X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000778769 issn: 2090-7141 databaseCode: CWDGH dateStart: 20110101 isFulltext: true titleUrlDefault: https://search.proquest.com/middleeastafrica providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2090-715X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000778769 issn: 2090-7141 databaseCode: BENPR dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2090-715X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000778769 issn: 2090-7141 databaseCode: PIMPY dateStart: 20120101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 2090-715X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000778769 issn: 2090-7141 databaseCode: 24P dateStart: 20080101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQAYkLlPdCW_lQTshaJ7Fjm1u3D4qgUVQBWrhEjh90pW4WbQP8fcaO0xYh1AsXS35ItsZjfzPW-BuEduF8laXlknCjc3BQmCUql5SEDFemBJeDxXfIzx9EVcn5XNXXUn2FmLCBHngQ3FQoqmTpc669Y5lupeKt88x7kTllbGQvpUJdc6ZAkxgDYBx5x-OdLEAxY367nCpKRMayMQqe8ymAoJoywHom2B_4FGn8419dDXXArrtnwVP-tfjr5o5wdLSJ7ic7Eu8N63-IbrnuEXow5mjA6cg-Rm9OwNA2IdAVH6yWetHhKsTF4gPXxyCsDu-df1utF_3ZEs8A0SyGpoq8XevlE_Tp6PDj_jFJ-RKIAZztic54C3ICYWUezChh4DLj1nlJW6Np3mpNrRCFstJCd8tdkbcG7L9SCqGZ18VTtNGtOvcc4cL6jHsN0BUI-7zVxhXOgulEvc4dkxP0epRSYxKZeMhpcd5Ep4LzJsi0STKdoFeXo78PJBr_GDcLAr8cE6ivYwMoRJMUorlJISboWdquq7nASstlOUG7aftuWMXWuLdNOtAXTSC6B9MPnLEX_2ORL9G9MOXwlrOFNvr1D7eN7pif_eJivYNuzw6r-nQn6jSU7wWBsuZfoad-d1J_gdrp8fw3DC_1VQ |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VAoIL5c1CAR_aE7I2cezYQUKoZSmtdhtxKKi31PGjXambLbsLFX-K38jYm7RCCDj1wDGO5cTxN_PNOOMZgA2Urzy3QlFhNEMHhVtaMJXQUOHK5Ohy8LgP-Xkky1IdHhYfV-BHdxYmhFV2OjEqajs1YY-8HzKNI_eiNfz27AsNVaPC39WuhMYSFkP3_RxdtvmbvQGu7yZjO-8P3u3StqoANchGC6pTUTOhc89Sj8aGNCjywjqvktrohNVaJ1bKrLDK4u1auIzVBq2kXEmpudcZjnsNrvNMySBXQ0k7_HKOdNxlO49MIFEcYlU9lhQJlSlPu9h7IfpIvUWfo4XBJf-FFWPxgHhCWOM1MubNk-Cfn49_44tIgjtr_9vnuwt3WnObbC3l4x6suOY-rHWlLEir2R7A6330R0yIByaD6USPG1KG8GEycIsYq9aQrdNjnM_iZEK2kfgtwaaSfpjpyUP4dCUzeASrzbRxT4Bk1qfCa2T4kNfQW21c5ixamInXzHHVg1fdslamzbkeSn-cVtH3EqIKIKhaEPRg86L32TLXyB_6bQeEXPQJGcJjw3R2XLUKp5JFUiico9De8VTXqhC189x7mbrCWNGDxy2-Lp-FxixTeQ82Wrz94y3WO6RVrd6bV5cwe_r32y_h1u7B_qga7ZXDZ3A7DLzc2FqH1cXsq3sON8y3xXg-exFFjMDRVYPyJxAoWOg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6V8lAvlHcXCvjQnlC0iWPHDhJCLctC1bLaA6CKS3D8aFfqZstuoOKv8esYe51WCAGnHjjGsZw4_ma-GWc8A7CF8lUUhsuEa0XRQWEmKalME1_hShfocrCwD_nxQIxG8vCwHK_Aj-4sjA-r7HRiUNRmpv0eed9nGkfuRWu472JYxHgwfHn6JfEVpPyf1q6cxhIi-_b7Gbpvixd7A1zrbUqHr9-_epvECgOJRmZqE5XxmnJVOJo5NDyERvHnxjqZ1lqltFYqNULkpZEGb9fc5rTWaDEVUgjFnMpx3CtwVaCP6cMJx_xTh2XGkJq7zOeBFQSKRqiwR9MyTUTGsi4On_M-0nDZZ2htMMF-YchQSCCcFlZ4jex5_dj76meT37gjEOJw_X_-lLfgZjTDyc5Sbm7Dim3uwHpX4oJEjXcXnr9DP0X7OGEymE3VpCEjH1ZMBrYNMWwN2Tk5wvm0x1OyiwaBIdg0St7M1fQefLiUGdyH1WbW2A0guXEZdwqZ3-c7dEZpm1uDlmfqFLVM9uBZt8SVjrnYfUmQkyr4ZJxXHhBVBEQPts97ny5zkPyh365Hy3kfnzk8NMzmR1VURJUo01LiHLlylmWqliWvrWPOicyW2vAePIhYu3gWGrlUFj3Yitj7x1tsdqiroj5cVBeQe_j320_hBmKxOtgb7T-CNT_ucr9rE1bb-Vf7GK7pb-1kMX8SpI3A58vG5E9ED2IM |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Malicious+Domain+Names+Detection+Algorithm+Based+on+N-Gram&rft.jtitle=Journal+of+computer+networks+and+communications&rft.au=Hong+Zhao&rft.au=Zhaobin+Chang&rft.au=Guangbin+Bao&rft.au=Xiangyan+Zeng&rft.date=2019-01-01&rft.pub=Wiley&rft.issn=2090-7141&rft.eissn=2090-715X&rft.volume=2019&rft_id=info:doi/10.1155%2F2019%2F4612474&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_790986f25afe41ab895bef4ff71e9cd5 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2090-7141&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2090-7141&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2090-7141&client=summon |