Malicious Domain Names Detection Algorithm Based on N-Gram

Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N-Gram method. Each domain name excluding the top-level domain is segme...

Full description

Saved in:
Bibliographic Details
Published in:Journal of computer networks and communications Vol. 2019; no. 2019; pp. 1 - 9
Main Authors: Zeng, Xiang-Yan, Bao, Guangbin, Chang, Zhaobin, Hong, Zhao
Format: Journal Article
Language:English
Published: Cairo, Egypt Hindawi Publishing Corporation 01.01.2019
Hindawi
John Wiley & Sons, Inc
Wiley
Subjects:
ISSN:2090-7141, 2090-715X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N-Gram method. Each domain name excluding the top-level domain is segmented into substrings according to its domain level with the lengths of 3, 4, 5, 6, and 7. The substring set of the 100,000 domain names is established, and the weight value of a substring is calculated according to its occurrence number in the substring set. To detect a malicious attack, the domain name is also segmented by the N-Gram method and its reputation value is calculated based on the weight values of its substrings. Finally, the judgment of whether the domain name is malicious is made by thresholding. In the experiments on Alexa 2017 and Malware domain list, the proposed detection algorithm yielded an accuracy rate of 94.04%, a false negative rate of 7.42%, and a false positive rate of 6.14%. The time complexity is lower than other popular malicious domain names detection algorithms.
AbstractList Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N-Gram method. Each domain name excluding the top-level domain is segmented into substrings according to its domain level with the lengths of 3, 4, 5, 6, and 7. The substring set of the 100,000 domain names is established, and the weight value of a substring is calculated according to its occurrence number in the substring set. To detect a malicious attack, the domain name is also segmented by the N-Gram method and its reputation value is calculated based on the weight values of its substrings. Finally, the judgment of whether the domain name is malicious is made by thresholding. In the experiments on Alexa 2017 and Malware domain list, the proposed detection algorithm yielded an accuracy rate of 94.04%, a false negative rate of 7.42%, and a false positive rate of 6.14%. The time complexity is lower than other popular malicious domain names detection algorithms.
Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N -Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N -Gram method. Each domain name excluding the top-level domain is segmented into substrings according to its domain level with the lengths of 3, 4, 5, 6, and 7. The substring set of the 100,000 domain names is established, and the weight value of a substring is calculated according to its occurrence number in the substring set. To detect a malicious attack, the domain name is also segmented by the N -Gram method and its reputation value is calculated based on the weight values of its substrings. Finally, the judgment of whether the domain name is malicious is made by thresholding. In the experiments on Alexa 2017 and Malware domain list, the proposed detection algorithm yielded an accuracy rate of 94.04%, a false negative rate of 7.42%, and a false positive rate of 6.14%. The time complexity is lower than other popular malicious domain names detection algorithms.
Author Bao, Guangbin
Zeng, Xiang-Yan
Chang, Zhaobin
Hong, Zhao
Author_xml – sequence: 1
  fullname: Zeng, Xiang-Yan
– sequence: 2
  fullname: Bao, Guangbin
– sequence: 3
  fullname: Chang, Zhaobin
– sequence: 4
  fullname: Hong, Zhao
BookMark eNqFkM1r3DAQxUXZQtJkbzkXQ4-tE41sWVJvm--FZHtpoTcxlqVEi21tZS8l_320cT4gUDoXjUa_9zS8T2TWh94ScgT0GIDzE0ZBnZQVsFKUH8g-o4rmAvjv2Wtfwh6ZD8OaphJCikrtk--32Hrjw3bIzkOHvs9W2Nl0saM1ow99tmjvQvTjfZed4mCbLI1W-VXE7pB8dNgOdv58HpBflxc_z67zmx9Xy7PFTW5KVo05Aq8Zx8oxcABMGF5I3lgnaW2QshqRNkIUqpFNeq65LVhtlBCVFAJLh8UBWU6-TcC13kTfYXzQAb1-GoR4pzGO3rRWC0WVTD9xdLYErKXitXWlcwKsMg1PXl8mr00Mf7Z2GPU6bGOf1tcMJOPAJasSxSbKxDAM0Tpt_Ii7NMaIvtVA9S5yvYtcP0eeRN_eiV5W_Qf-dcLvfd_gX_8_-vNE28RYh280CMZkVTwC5biXuQ
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3454242
crossref_primary_10_1109_ACCESS_2022_3162588
crossref_primary_10_1007_s12243_024_01043_3
crossref_primary_10_1109_ACCESS_2021_3080456
crossref_primary_10_1155_2019_5217961
crossref_primary_10_1007_s12083_024_01822_8
crossref_primary_10_1109_ACCESS_2025_3608450
crossref_primary_10_1109_TIFS_2022_3183390
crossref_primary_10_1371_journal_pone_0279866
crossref_primary_10_1007_s42979_023_02243_9
crossref_primary_10_26636_jtit_2025_FITCE2024_2033
crossref_primary_10_1080_19393555_2021_1934198
crossref_primary_10_1109_ACCESS_2023_3286313
crossref_primary_10_1109_ACCESS_2019_2940554
Cites_doi 10.1007/s11063-017-9666-7
10.1016/j.diin.2017.12.002
10.1155/2017/7674594
10.1016/j.comnet.2015.12.008
10.1109/mnet.2013.6423188
10.1109/tnet.2012.2184552
10.1109/lcomm.2013.112413.132231
10.1145/2584679
10.1016/j.diin.2014.11.001
ContentType Journal Article
Copyright Copyright © 2019 Hong Zhao et al.
Copyright © 2019 Hong Zhao et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2019 Hong Zhao et al.
– notice: Copyright © 2019 Hong Zhao et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
3V.
7SC
7SP
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
CWDGH
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOA
DOI 10.1155/2019/4612474
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One
Middle East & Africa Database
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
Middle East & Africa Database
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList


Publicly Available Content Database
CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 3
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2090-715X
Editor Chaeikar, Saman S.
Editor_xml – sequence: 1
  givenname: Saman S.
  surname: Chaeikar
  fullname: Chaeikar, Saman S.
EndPage 9
ExternalDocumentID oai_doaj_org_article_790986f25afe41ab895bef4ff71e9cd5
10_1155_2019_4612474
1172286
GrantInformation_xml – fundername: CERNET Innovation Project
  grantid: NGII20160311; NGII20160112
– fundername: Gansu Science Foundation of China
  grantid: 18JR3RA156
– fundername: National Natural Science Foundation of China
  grantid: 51668043; 61262016
GroupedDBID .4S
.DC
0R~
24P
4.4
5VS
8FE
8FG
AAFWJ
AAKPC
AAMMB
ABUWG
ACCMX
ADBBV
ADJCN
ADMLS
AEFGJ
AFKRA
AFPKN
AGXDD
AHFXO
AIDQK
AIDYY
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CWDGH
DWQXO
EBS
EDO
EJD
GNUQQ
GROUPED_DOAJ
H13
HCIFZ
IAO
ICD
IHR
IL9
ITC
IVC
K6V
K7-
KQ8
OK1
P62
PHGZM
PHGZT
PIMPY
PQGLB
PQQKQ
PROAC
PUEGO
Q2X
TR2
TUS
3V.
AAJEY
M0N
M~E
RHU
RHW
RHX
AAYXX
AFFHD
ALUQN
CITATION
7SC
7SP
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c426t-a15b25a6f21f1127c5385def80bca02baa0d7739d8d112b5e32bc9776877a4fa3
IEDL.DBID DOA
ISICitedReferencesCount 20
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000459043000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2090-7141
IngestDate Fri Oct 03 12:34:30 EDT 2025
Fri Jul 25 20:48:51 EDT 2025
Sat Nov 29 02:31:12 EST 2025
Tue Nov 18 20:51:33 EST 2025
Sun Jun 02 19:19:40 EDT 2024
Thu Sep 25 15:09:55 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2019
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c426t-a15b25a6f21f1127c5385def80bca02baa0d7739d8d112b5e32bc9776877a4fa3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1574-979X
0000-0001-8850-0891
0000-0002-5515-6139
0000-0002-9023-338X
OpenAccessLink https://doaj.org/article/790986f25afe41ab895bef4ff71e9cd5
PQID 2182515826
PQPubID 237794
PageCount 9
ParticipantIDs doaj_primary_oai_doaj_org_article_790986f25afe41ab895bef4ff71e9cd5
proquest_journals_2182515826
crossref_citationtrail_10_1155_2019_4612474
crossref_primary_10_1155_2019_4612474
hindawi_primary_10_1155_2019_4612474
emarefa_primary_1172286
PublicationCentury 2000
PublicationDate 2019-01-01
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – month: 01
  year: 2019
  text: 2019-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: New York
PublicationTitle Journal of computer networks and communications
PublicationYear 2019
Publisher Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Wiley
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: John Wiley & Sons, Inc
– name: Wiley
References 36
27
(24) 2016; 27
29
19
(16) 2016; 17
(20) 2013; 47
(13) 2017; 38
2
(26) 2017; 45
3
(23) 2018; 35
(1) 2018
5
(17) 2018; 39
6
(10) 2018; 45
8
References_xml – volume: 47
  start-page: 54
  issue: 8
  year: 2013
  ident: 20
  publication-title: Journal of Xian Jiaotong University
– ident: 8
  doi: 10.1007/s11063-017-9666-7
– ident: 27
  doi: 10.1016/j.diin.2017.12.002
– volume: 17
  start-page: 217
  issue: 2
  year: 2016
  ident: 16
  publication-title: Journal Of Internet Technology
– ident: 36
  doi: 10.1155/2017/7674594
– ident: 19
  doi: 10.1016/j.comnet.2015.12.008
– volume: 45
  start-page: 1592
  issue: 8
  year: 2017
  ident: 26
  publication-title: Computer and Digital Engineering
– volume: 27
  start-page: 2348
  issue: 9
  year: 2016
  ident: 24
  publication-title: Journal of Software
– ident: 29
  doi: 10.1109/mnet.2013.6423188
– volume: 39
  start-page: 15
  issue: 7
  year: 2018
  ident: 17
  publication-title: Journal on Communications
– ident: 3
  doi: 10.1109/tnet.2012.2184552
– volume: 38
  start-page: 19
  issue: 5
  year: 2017
  ident: 13
  publication-title: Journal on Communications
– volume-title: 36th internet security threat report
  year: 2018
  ident: 1
– ident: 2
  doi: 10.1109/lcomm.2013.112413.132231
– volume: 35
  start-page: 287
  issue: 3
  year: 2018
  ident: 23
  publication-title: Computer Simulation
– volume: 45
  start-page: 231
  issue: 2
  year: 2018
  ident: 10
  publication-title: Computer Science
– ident: 5
  doi: 10.1145/2584679
– ident: 6
  doi: 10.1016/j.diin.2014.11.001
SSID ssj0000778769
ssib044743864
Score 2.2051282
Snippet Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is...
Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N -Gram...
SourceID doaj
proquest
crossref
hindawi
emarefa
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Behavior
Blacklisting
Computer networks
Computer simulation
Cybersecurity
Domain names
International conferences
Internet
Malware
Mathematical analysis
Semantics
Servers
Trademarks
URLs
Weight
SummonAdditionalLinks – databaseName: Hindawi Publishing Open Access
  dbid: RHX
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB6VFZV6gVLaskCRD_SEoiaOHdvc2PI6tCuE2mpvkeNHWYndRbsB_j5jrwMqqGqPdiwnmfH4m3Em3wDso31VleUy40ZTDFCYzRSVeRYqXJkKQw4WzyF_fRPDoRyN1EUiSVq8_ISPaIfheaG-MERiJtgKrEgeMrcuz0fdsmHYX3Yk43EDFrgKYzE7mqs8EwUrupT3Z9P9AUaRsz_-mKuxjUD1-iqExffjF9t0xJ7Tt7CWnEZytNTyBrxy03ew3hVkIMk-N-HwO3rVJmS1kuPZBGN-MgxJsOTYtTHjakqOrn_P5uP2akIGCF-WYNcwO5vryXv4eXry4-t5loojZAZBtc10wRvKdeVp4dFnEgZ3Lm6dl3ljdE4brXMrRKmstHi54a6kjUFnr5JCaOZ1-QF609nUbQEprS-414hTgZ3PW21c6Sz6SbnX1DHZh4NOSrVJzOGhgMV1HSMIzusg0zrJtA-fH0ffLBkz_jJuEAT-OCbwXMcO1H2dzKYWKlcS35Fr71ihG6l44zzzXhROGcv78DGp6-le6JJRWfVhP6nvH0-x2-m2Tta7qAOrPfp5GHlt_98sO_AmNJdHM7vQa-e37hOsmrt2vJjvxdX6AOWV21k
  priority: 102
  providerName: Hindawi Publishing
– databaseName: Advanced Technologies & Aerospace Database
  dbid: P5Z
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6VFiQutLwXWuRDOSFrE8eObS6opbQc6KqHgioukeNHu1I3W3YD_H3GXqcVQsChx9iWE2fs-WYmk28AdvF81bUTigprGDoo3FHNVEFjhStbo8vBUxzyyyc5maizM32SA27LnFY56MSkqN3cxhj5ODKNI_aiNfzu6huNVaPi19VcQuMObESWhFi64UR8HfYT5wiPA_t40swSt2eqcscKXVBZ8nLIhRdijFCoxxwRn0v-G0olMv_0x67Ba0SwexfRX_45_UN_J1A63LztcrbgQTZHyd5q_zyENd89gs2h1APJJ_8xvD1Ge93GfFlyMJ-ZaUcmMb2WHPg-5XJ1ZO_yHOfvL2ZkH4HREWya0KOFmT2Bz4cfTt9_pLnsArUI1z01pWiZMHVgZUBrTFrUicL5oIrWmoK1xhROyko75bC7Fb5irUUzslZSGh5M9RTWu3nnnwOpXChFMIiAkfcvOGN95R1aYEUwzHM1gjfDa25s5iSPpTEum-SbCNFEoTRZKCN4fT36asXF8Zdx-1Fi12Mig3ZqmC_Om3wgG6kLrXCNwgTPS9MqLVofeAiy9No6MYJnWd4390Jjj6l6BLtZ_v95iu1B8k3WC8vmRuwv_t39Eu7HyVbBnm1Y7xff_Q7ctT_66XLxKm3zX8C__DY
  priority: 102
  providerName: ProQuest
Title Malicious Domain Names Detection Algorithm Based on N-Gram
URI https://search.emarefa.net/detail/BIM-1172286
https://dx.doi.org/10.1155/2019/4612474
https://www.proquest.com/docview/2182515826
https://doaj.org/article/790986f25afe41ab895bef4ff71e9cd5
Volume 2019
WOSCitedRecordID wos000459043000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2090-715X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000778769
  issn: 2090-7141
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2090-715X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib044743864
  issn: 2090-7141
  databaseCode: M~E
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2090-715X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000778769
  issn: 2090-7141
  databaseCode: P5Z
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 2090-715X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000778769
  issn: 2090-7141
  databaseCode: K7-
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Middle East & Africa Database
  customDbUrl:
  eissn: 2090-715X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000778769
  issn: 2090-7141
  databaseCode: CWDGH
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/middleeastafrica
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2090-715X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000778769
  issn: 2090-7141
  databaseCode: BENPR
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2090-715X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000778769
  issn: 2090-7141
  databaseCode: PIMPY
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 2090-715X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000778769
  issn: 2090-7141
  databaseCode: 24P
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQAYkLlPdCW_lQTshaJ7Fjm1u3D4qgUVQBWrhEjh90pW4WbQP8fcaO0xYh1AsXS35ItsZjfzPW-BuEduF8laXlknCjc3BQmCUql5SEDFemBJeDxXfIzx9EVcn5XNXXUn2FmLCBHngQ3FQoqmTpc669Y5lupeKt88x7kTllbGQvpUJdc6ZAkxgDYBx5x-OdLEAxY367nCpKRMayMQqe8ymAoJoywHom2B_4FGn8419dDXXArrtnwVP-tfjr5o5wdLSJ7ic7Eu8N63-IbrnuEXow5mjA6cg-Rm9OwNA2IdAVH6yWetHhKsTF4gPXxyCsDu-df1utF_3ZEs8A0SyGpoq8XevlE_Tp6PDj_jFJ-RKIAZztic54C3ICYWUezChh4DLj1nlJW6Np3mpNrRCFstJCd8tdkbcG7L9SCqGZ18VTtNGtOvcc4cL6jHsN0BUI-7zVxhXOgulEvc4dkxP0epRSYxKZeMhpcd5Ep4LzJsi0STKdoFeXo78PJBr_GDcLAr8cE6ivYwMoRJMUorlJISboWdquq7nASstlOUG7aftuWMXWuLdNOtAXTSC6B9MPnLEX_2ORL9G9MOXwlrOFNvr1D7eN7pif_eJivYNuzw6r-nQn6jSU7wWBsuZfoad-d1J_gdrp8fw3DC_1VQ
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VAoIL5c1CAR_aE7I2cezYQUKoZSmtdhtxKKi31PGjXambLbsLFX-K38jYm7RCCDj1wDGO5cTxN_PNOOMZgA2Urzy3QlFhNEMHhVtaMJXQUOHK5Ohy8LgP-Xkky1IdHhYfV-BHdxYmhFV2OjEqajs1YY-8HzKNI_eiNfz27AsNVaPC39WuhMYSFkP3_RxdtvmbvQGu7yZjO-8P3u3StqoANchGC6pTUTOhc89Sj8aGNCjywjqvktrohNVaJ1bKrLDK4u1auIzVBq2kXEmpudcZjnsNrvNMySBXQ0k7_HKOdNxlO49MIFEcYlU9lhQJlSlPu9h7IfpIvUWfo4XBJf-FFWPxgHhCWOM1MubNk-Cfn49_44tIgjtr_9vnuwt3WnObbC3l4x6suOY-rHWlLEir2R7A6330R0yIByaD6USPG1KG8GEycIsYq9aQrdNjnM_iZEK2kfgtwaaSfpjpyUP4dCUzeASrzbRxT4Bk1qfCa2T4kNfQW21c5ixamInXzHHVg1fdslamzbkeSn-cVtH3EqIKIKhaEPRg86L32TLXyB_6bQeEXPQJGcJjw3R2XLUKp5JFUiico9De8VTXqhC189x7mbrCWNGDxy2-Lp-FxixTeQ82Wrz94y3WO6RVrd6bV5cwe_r32y_h1u7B_qga7ZXDZ3A7DLzc2FqH1cXsq3sON8y3xXg-exFFjMDRVYPyJxAoWOg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6V8lAvlHcXCvjQnlC0iWPHDhJCLctC1bLaA6CKS3D8aFfqZstuoOKv8esYe51WCAGnHjjGsZw4_ma-GWc8A7CF8lUUhsuEa0XRQWEmKalME1_hShfocrCwD_nxQIxG8vCwHK_Aj-4sjA-r7HRiUNRmpv0eed9nGkfuRWu472JYxHgwfHn6JfEVpPyf1q6cxhIi-_b7Gbpvixd7A1zrbUqHr9-_epvECgOJRmZqE5XxmnJVOJo5NDyERvHnxjqZ1lqltFYqNULkpZEGb9fc5rTWaDEVUgjFnMpx3CtwVaCP6cMJx_xTh2XGkJq7zOeBFQSKRqiwR9MyTUTGsi4On_M-0nDZZ2htMMF-YchQSCCcFlZ4jex5_dj76meT37gjEOJw_X_-lLfgZjTDyc5Sbm7Dim3uwHpX4oJEjXcXnr9DP0X7OGEymE3VpCEjH1ZMBrYNMWwN2Tk5wvm0x1OyiwaBIdg0St7M1fQefLiUGdyH1WbW2A0guXEZdwqZ3-c7dEZpm1uDlmfqFLVM9uBZt8SVjrnYfUmQkyr4ZJxXHhBVBEQPts97ny5zkPyh365Hy3kfnzk8NMzmR1VURJUo01LiHLlylmWqliWvrWPOicyW2vAePIhYu3gWGrlUFj3Yitj7x1tsdqiroj5cVBeQe_j320_hBmKxOtgb7T-CNT_ucr9rE1bb-Vf7GK7pb-1kMX8SpI3A58vG5E9ED2IM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Malicious+Domain+Names+Detection+Algorithm+Based+on+N-Gram&rft.jtitle=Journal+of+computer+networks+and+communications&rft.au=Hong+Zhao&rft.au=Zhaobin+Chang&rft.au=Guangbin+Bao&rft.au=Xiangyan+Zeng&rft.date=2019-01-01&rft.pub=Wiley&rft.issn=2090-7141&rft.eissn=2090-715X&rft.volume=2019&rft_id=info:doi/10.1155%2F2019%2F4612474&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_790986f25afe41ab895bef4ff71e9cd5
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2090-7141&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2090-7141&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2090-7141&client=summon