{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:24Z","timestamp":1761402024101},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_8","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"89-101","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique"],"prefix":"10.1007","author":[{"given":"Yasir F.","family":"Mohammed","sequence":"first","affiliation":[]},{"given":"Dale R.","family":"Thompson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"8_CR1","unstructured":"The Go programming language. \n                    https:\/\/golang.org\/\n                    \n                  . Accessed 06 Feb 2019"},{"key":"8_CR2","unstructured":"Panda - python data analysis library. \n                    https:\/\/pandas.pydata.org\/\n                    \n                  . Accessed 06 Nov 2018"},{"key":"8_CR3","unstructured":"The R project for statistical computing. \n                    https:\/\/www.r-project.org\/\n                    \n                  . Accessed 06 Nov 2018"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Born, K., Gustafson, D.: NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW 2010 (2010). \n                    https:\/\/doi.org\/10.1145\/1852666.1852718","DOI":"10.1145\/1852666.1852718"},{"key":"8_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.12.003","author":"H Choi","year":"2009","unstructured":"Choi, H., Lee, H., Kim, H.: Fast detection and visualization of network attacks on parallel coordinates. Comput. Secur. (2009). \n                    https:\/\/doi.org\/10.1016\/j.cose.2008.12.003","journal-title":"Comput. Secur."},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Cuzzocrea, A., Zall, D.: Parallel coordinates technique in visual data mining: advantages, disadvantages and combinations. In: 2013 17th International Conference on Information Visualisation, pp. 278\u2013284, July 2013. \n                    https:\/\/doi.org\/10.1109\/IV.2013.96","DOI":"10.1109\/IV.2013.96"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Das, A., Shen, M.Y., Shashanka, M., Wang, J.: Detection of exfiltration and tunneling over DNS. In: Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017 (2018). \n                    https:\/\/doi.org\/10.1109\/ICMLA.2017.00-71","DOI":"10.1109\/ICMLA.2017.00-71"},{"key":"8_CR8","unstructured":"Farnham, G., Atlasis, A.: Detecting DNS Tunneling Detecting DNS Tunneling GIAC (GCIA) Gold Certification Detecting DNS Tunneling 2. sans.org (2013)"},{"key":"8_CR9","unstructured":"Green, A.: DNSMessenger: 2017\u2019s most beloved remote access Trojan (Rat), December 2017. \n                    https:\/\/bit.ly\/2BxBz6O"},{"key":"8_CR10","unstructured":"Grunzweig, J., Scott, M., Lee, B.: New wekby attacks use DNS requests as command and control mechanism, May 2016. \n                    http:\/\/bit.ly\/1TAYE8j"},{"key":"8_CR11","unstructured":"Incapsula, I.: DNS flood (2017). \n                    https:\/\/www.incapsula.com\/ddos\/attack-glossary\/dns-flood.html\n                    \n                  . Accessed 06 Feb 2019"},{"key":"8_CR12","unstructured":"Kim, I., Choi, H., Lee, H.: BotXrayer: exposing botnets by visualizing DNS traffic. In: KSII the First International Conference on Internet (ICONI) (2009)"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Liu, J., Li, S., Zhang, Y., Xiao, J., Chang, P., Peng, C.: Detecting DNS tunnel through binary-classification based on behavior features. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 339\u2013346, August 2017. \n                    https:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.256","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.256"},{"key":"8_CR14","unstructured":"Revelli, A., Leidecker, N.: Introducing heyoka: DNS tunneling 2.0 (2009). \n                    http:\/\/heyoka.sourceforge.net\/Heyoka-SOURCEBoston2009.pdf\n                    \n                  . Accessed 07 Feb 2019"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Satam, P., Alipour, H., Al-Nashif, Y., Hariri, S.: DNS-IDS: securing DNS in the cloud era. In: 2015 International Conference on Cloud and Autonomic Computing, pp. 296\u2013301, September 2015. \n                    https:\/\/doi.org\/10.1109\/ICCAC.2015.46","DOI":"10.1109\/ICCAC.2015.46"},{"issue":"08","key":"8_CR16","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1055\/s-2006-941504","volume":"72","author":"Emerson Queiroz","year":"2006","unstructured":"Steve Jaworski, R.W.: Using splunk to detect DNS tunneling. Technical report (2016). \n                    https:\/\/doi.org\/10.1055\/s-2006-941504","journal-title":"Planta Medica"},{"key":"8_CR17","unstructured":"Verisign: Framework for resilient DNS security (2018). \n                    https:\/\/blog.verisign.com\/security\/framework-resilient-dns-security-dns-availability-drives-business\/\n                    \n                  . Accessed 01 Aug 2018"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-73614-1_8","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"B Zdrnja","year":"2007","unstructured":"Zdrnja, B., Brownlee, N., Wessels, D.: Passive monitoring of DNS anomalies. In: M. H\u00e4mmerli, B., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 129\u2013139. Springer, Heidelberg (2007). \n                    https:\/\/doi.org\/10.1007\/978-3-540-73614-1_8"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:04:42Z","timestamp":1562771082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}