{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:50:01Z","timestamp":1742961001268,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":6,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_845","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:53:03Z","timestamp":1319723583000},"page":"362-363","source":"Crossref","is-referenced-by-count":4,"title":["DNS-Based Botnet Detection"],"prefix":"10.1007","author":[{"given":"Brent Byung Hoon","family":"Kang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"845_CR1_845","volume-title":"Botnet detection and response, the network is the infection","author":"D Dagon","year":"2005","unstructured":"Dagon D (2005) Botnet detection and response, the network is the infection. In: OARC workshop"},{"key":"845_CR2_845","unstructured":"Dagon D, Zou C, Lee W (2006) Modeling botnet propagation using time zones. In: Proceedings of 13th network and distributed system security symposium (NDSS\u201906), Santa\u00a0Clara"},{"key":"845_CR3_845","doi-asserted-by":"crossref","unstructured":"Oberheide J, Karir M, Mao ZM (2007) Characterizing dark DNS behavior. In: Proceedings of 4th international conference on detection of intrusions and malware, and vulnerability assessment, Lucerne","DOI":"10.1007\/978-3-540-73614-1_9"},{"key":"845_CR4_845","unstructured":"Ramachandran NFA, Dagon D (2006) Revealing botnet membership using dnsbl counter-intelligence. In: Proceedings of 2nd workshop on steps to reducing unwanted traffic on the internet (SRUTI\u201906), San\u00a0Jose"},{"key":"845_CR5_845","unstructured":"Schonewille A, van Helmond DJ (2006) The domain name service as an IDS Master\u2019s project, University of Amsterdam, Netherlands. \n                  http:\/\/staff.science.uva.nl\/~delaat\/snb-2005-2006\/p12\/report.pdf\n                  \n                . Accessed Feb\u00a02006"},{"key":"845_CR6_845","doi-asserted-by":"crossref","unstructured":"Villamarin-Salomon R, Brustoloni JC (2008) Identifying botnets using anomaly detection techniques applied to DNS traffic. In: Proceedings of 5th IEEE consumer communications and networking conference (CCNC 2008), Las\u00a0Vegas","DOI":"10.1109\/ccnc08.2007.112"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:34:34Z","timestamp":1591058074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_845","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}