{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:11:43Z","timestamp":1752228703919,"version":"3.40.5"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031334573"},{"type":"electronic","value":"9783031334580"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33458-0_3","type":"book-chapter","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T13:02:35Z","timestamp":1686920555000},"page":"32-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Web Bot Detection Based on\u00a0Hidden Features of\u00a0HTTP Access Log"],"prefix":"10.1007","author":[{"given":"Kaiyuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Mingrong","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Mitalkumar","family":"Kakaiya","sequence":"additional","affiliation":[]},{"given":"Shashank","family":"Kaul","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Geroimenko, V.: Dictionary of XML Technologies and the Semantic Web, vol. 1. Springer, Cham (2004), https:\/\/doi.org\/10.1007\/978-0-85729-376-3","DOI":"10.1007\/978-0-85729-376-3"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Menczer, F., Pant, G., Srinivasan, P., Ruiz, M.E.: Evaluating topic-driven web crawlers. In: Proceedings of the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 241\u2013249 (2001)","DOI":"10.1145\/383952.383995"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Shemshadi, A., Sheng, Q.Z., Qin, Y.: ThingSeek: a crawler and search engine for the internet of things. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1149\u20131152 (2016)","DOI":"10.1145\/2911451.2911471"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Li, X., Azad, B.A., Rahmati, A., Nikiforakis, N.: Good bot, bad bot: characterizing automated browsing activity. In: 2021 IEEE Symposium on Security and Privacy (sp), pp. 1589\u20131605. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00079"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Nagaraja, S., Shah, R.: Clicktok: click fraud detection using traffic analysis. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 105\u2013116 (2019)","DOI":"10.1145\/3317549.3323407"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X., Gu, B., Qu, Y., Ren, Y., Xiang, Y., Gao, L.: Reliable customized privacy-preserving in fog computing. In: ICC 2020\u20132020 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9148989"},{"key":"3_CR7","unstructured":"Imperva. 2022 imperva bad bot report (2018). https:\/\/www.imperva.com\/resources\/reports\/2022-Imperva-Bad-Bot-Report.pdf"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Basso, A., Bergadano, F.: Anti-bot strategies based on human interactive proofs. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 273\u2013291. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-04117-4_15","DOI":"10.1007\/978-3-642-04117-4_15"},{"key":"3_CR9","unstructured":"Basso, A.: Protecting web resources from massive automated access. University of Torino, Technical RT114\/08 (2008)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"L von Ahn","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294\u2013311. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_18"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1007\/978-3-030-29962-0_28","volume-title":"Computer Security \u2013 ESORICS 2019","author":"H Jonker","year":"2019","unstructured":"Jonker, H., Krumnow, B., Vlot, G.: Fingerprint surface-based detection of web bot detectors. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 586\u2013605. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29962-0_28"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"102577","DOI":"10.1016\/j.jnca.2020.102577","volume":"157","author":"S Rovetta","year":"2020","unstructured":"Rovetta, S., Suchacka, G., Masulli, F.: Bot recognition in a web store: an approach based on unsupervised learning. J. Netw. Comput. Appl. 157, 102577 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"107074","DOI":"10.1016\/j.knosys.2021.107074","volume":"223","author":"G Suchacka","year":"2021","unstructured":"Suchacka, G., Cabri, A., Rovetta, S., Masulli, F.: Efficient on-the-fly web bot detection. Knowl. Based Syst. 223, 107074 (2021)","journal-title":"Knowl. Based Syst."},{"key":"3_CR14","unstructured":"Rocha, E.: 2018 bad bot report: the year bad bots went mainstream (2018). https:\/\/www.globaldots.com\/resources\/blog\/2018-bad-bot-report-the-year-bad-bots-went-mainstream\/"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Wang, W., Huang, Y., Wang, Y., Wang, L.: Generalized autoencoder: a neural network framework for dimensionality reduction. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 490\u2013497 (2014)","DOI":"10.1109\/CVPRW.2014.79"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1\u20138. IEEE (2017)","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Cabri, A., Suchacka, G., Rovetta, S., Masulli, F.: Online web bot detection using a sequential classification approach. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 1536\u20131540. IEEE (2018)","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00252"},{"key":"3_CR18","unstructured":"Luo, Y., She, G., Cheng, P., Xiong, Y.: BotGraph: web bot detection based on sitemap. arXiv preprint arXiv:1903.08074 (2019)"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.10.007","volume":"76","author":"D Acarali","year":"2016","unstructured":"Acarali, D., Rajarajan, M., Komninos, N., Herwono, I.: Survey of approaches and features for the identification of http-based botnet traffic. J. Netw. Comput. Appl. 76, 1\u201315 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Chavoshi, N., Hamooni, H., Mueen, A.: Temporal patterns in bot activities. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 1601\u20131606 (2017)","DOI":"10.1145\/3041021.3051114"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"McInnes, L., Healy, J., Melville, J.: UMAP: uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018)","DOI":"10.21105\/joss.00861"},{"issue":"3","key":"3_CR22","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/0146-664X(80)90054-4","volume":"14","author":"P-E Danielsson","year":"1980","unstructured":"Danielsson, P.-E.: Euclidean distance mapping. Comput. Graph. Image Process. 14(3), 227\u2013248 (1980)","journal-title":"Comput. Graph. Image Process."},{"issue":"3","key":"3_CR23","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/s00357-014-9161-z","volume":"31","author":"F Murtagh","year":"2014","unstructured":"Murtagh, F., Legendre, P.: Ward\u2019s hierarchical agglomerative clustering method: which algorithms implement ward\u2019s criterion? J. Classif. 31(3), 274\u2013295 (2014)","journal-title":"J. Classif."},{"issue":"6","key":"3_CR24","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1111\/exsy.12184","volume":"33","author":"D Doran","year":"2016","unstructured":"Doran, D., Gokhale, S.S.: An integrated method for real time and offline web robot detection. Expert Syst. 33(6), 592\u2013606 (2016)","journal-title":"Expert Syst."},{"key":"3_CR25","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-95095-2_19","volume-title":"Quantifying and Processing Biomedical and Behavioral Signals","author":"S Rovetta","year":"2019","unstructured":"Rovetta, S., Cabri, A., Masulli, F., Suchacka, G.: Bot or not? a case study on bot recognition from web session logs. In: Esposito, A., Faundez-Zanuy, M., Morabito, F.C., Pasero, E. (eds.) WIRN 2017 2017. SIST, vol. 103, pp. 197\u2013206. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-95095-2_19"},{"key":"3_CR26","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.eswa.2017.06.004","volume":"87","author":"M Zabihimayvan","year":"2017","unstructured":"Zabihimayvan, M., Sadeghi, R., Rude, H.N., Doran, D.: A soft computing approach for benign and malicious web robot detection. Expert Syst. Appl. 87, 129\u2013140 (2017)","journal-title":"Expert Syst. Appl."},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., Frystyk, H.: Hypertext transfer protocol-http\/1.0. Technical report (1996)","DOI":"10.17487\/rfc1945"},{"issue":"4","key":"3_CR28","first-page":"327","volume":"9","author":"KR Suneetha and Raghuraman Krishnamoorthi","year":"2009","unstructured":"KR Suneetha and Raghuraman Krishnamoorthi: Identifying user behavior by analyzing web server access log file. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9(4), 327\u2013332 (2009)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"issue":"7","key":"3_CR29","first-page":"2972","volume":"4","author":"J Yadav","year":"2013","unstructured":"Yadav, J., Sharma, M.: A review of k-mean algorithm. Int. J. Eng. Trends Technol. 4(7), 2972\u20132976 (2013)","journal-title":"Int. J. Eng. Trends Technol."},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Chowdhary, C.L., Acharjya, D. P.: Clustering algorithm in possibilistic exponential fuzzy C-mean segmenting medical images. In: Journal of Biomimetics, Biomaterials and Biomedical Engineering, vol. 30, pp. 12\u201323. Trans Tech Publications Ltd (2017)","DOI":"10.4028\/www.scientific.net\/JBBBE.30.12"},{"key":"3_CR31","first-page":"1","volume":"32","author":"KG Derpanis","year":"2005","unstructured":"Derpanis, K.G.: Mean shift clustering. Lect. Notes 32, 1\u20134 (2005)","journal-title":"Lect. Notes"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Tools for Design, Implementation and Verification of Emerging Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33458-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T13:06:16Z","timestamp":1686920776000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33458-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031334573","9783031334580"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33458-0_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TridentCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Testbeds and Research Infrastructures","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tridentcom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}