{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:22:44Z","timestamp":1753600964653,"version":"3.40.4"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319042824"},{"type":"electronic","value":"9783319042831"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-04283-1_4","type":"book-chapter","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T02:28:18Z","timestamp":1387247298000},"page":"53-68","source":"Crossref","is-referenced-by-count":4,"title":["Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets"],"prefix":"10.1007","author":[{"given":"Cui","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Fang","family":"Binxing","sequence":"additional","affiliation":[]},{"given":"Shi","family":"Jinqiao","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Chaoge","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Plohmann, D., Gerhards-Padilla, E.: Case Study of the Miner Botnet. In: Proceedings of the 4th International Conference on Cyber Conflict (2012)","key":"4_CR1"},{"unstructured":"Werner, T.: The Miner Botnet: Bitcoin Mining Goes Peer-To-Peer, Blog article by Kaspersky Lab (2011), http:\/\/www.securelist.com\/en\/blog\/208193084\/","key":"4_CR2"},{"unstructured":"Wang, P., Sparks, S., Zou, C.C.: An advanced hybrid peer to peer botnet. In: Proceedings of the First Workshop on Hot Topics in Understanding Botnets, HotBots 2007 (2007)","key":"4_CR3"},{"unstructured":"Vogt, R., Aycock, J., Jacobson, M.: Army of botnets. In: Proceedings of 14th Annual Network and Distributed System Security Symposium, NDSS 2007 (2007)","key":"4_CR4"},{"unstructured":"Cui, X., Fang, B.X., Yin, L.H., Liu, X.Y.: Andbot: Towards Advanced Mobile Botnets. In: Proceedings of the 4th Usenix Workshop on Large-scale Exploits and Emergent Threats, LEET 2011 (2011)","key":"4_CR5"},{"doi-asserted-by":"crossref","unstructured":"Hund, R., Hamann, M., Holz, T.: Towards Next-Generation Botnets. In: Proceedings of the 2008 European Conference on Computer Network Defense (2008)","key":"4_CR6","DOI":"10.1109\/EC2ND.2008.11"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-24861-0_10","volume-title":"Information Security","author":"G. Yan","year":"2011","unstructured":"Yan, G., Chen, S., Eidenbenz, S.: RatBot: Anti-enumeration Peer-to-Peer Botnets. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol.\u00a07001, pp. 135\u2013151. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Kapil, S., Abhinav, S., et al.: Evaluating Email\u2019s Feasibility for Botnet Command and Control. In: Proc. of the 38th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 376\u2013385. IEEE Computer Society, Washington, DC (2008)","key":"4_CR8","DOI":"10.1109\/DSN.2008.4630106"},{"doi-asserted-by":"crossref","unstructured":"Starnberger, G., Kruegel, C., Kirda, E.: Overbot: A Botnet Protocol Based on Kademlia. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (2008)","key":"4_CR9","DOI":"10.1145\/1460877.1460894"},{"doi-asserted-by":"crossref","unstructured":"Rossow, C., Andriesse, D., Werner, T., Stone-Gross, B., Plohmann, D., Dietrich, C.J., Bos, H.: P2PWNED: Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. In: 34th IEEE Symposium on Security and Privacy, S&P 2013, San Francisco, CA (2013)","key":"4_CR10","DOI":"10.1109\/SP.2013.17"},{"doi-asserted-by":"crossref","unstructured":"Wang, P., Wu, L., Aslam, B., Zou, C.C.: A Systematic Study on Peer-to-Peer Botnets. In: Proc. of International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20138. IEEE Computer Society, Washington, DC (2009)","key":"4_CR11","DOI":"10.1109\/ICCCN.2009.5235360"},{"unstructured":"Roland, D.P.: Malware Uses Sendspace to Store Stolen Documents (2012), doi: http:\/\/tinyurl.com\/use-Cloud-but-no-ShortenURL","key":"4_CR12"},{"unstructured":"Neumann, A., Barnickel, J., Meyer, U.: Security and privacy implications of url shortening services. In: Proceedings of the Workshop on Web 2.0 Security and Privacy (2010)","key":"4_CR13"},{"unstructured":"Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., Dagon, D.: From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. In: Proceedings of the 21st USENIX Security Symposium (2012)","key":"4_CR14"},{"unstructured":"Bukowski, T.: ZeuS v3 P2P Network Monitoring, Technical Report by CERT.pl (2012)","key":"4_CR15"},{"unstructured":"Bureau, P.-M.: Same Botnet, Same Guys, New Code: Win32\/Kelihos. In: VirusBulletin (2011)","key":"4_CR16"},{"key":"4_CR17","volume-title":"Proc. of the 15th Annual Network and Distributed System Security Symposium","author":"T. Holz","year":"2008","unstructured":"Holz, T., Gorecki, C., Rieck, C., Freiling, F.C.: Detection and mitigation of fast-flux service networks. In: Proc. of the 15th Annual Network and Distributed System Security Symposium. USENIX Association, Berkeley (2008)"},{"key":"4_CR18","first-page":"2","volume-title":"Proc. of the 3th USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms and More","author":"C.Y. Cho","year":"2010","unstructured":"Cho, C.Y., Caballero, J., Grier, C., Paxson, V., Song, D.: Insights from the Inside: A View of Botnet Management from Infiltration. In: Proc. of the 3th USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms and More, p. 2. USENIX Association, Berkeley (2010)"},{"unstructured":"Dittrich, D.: So You Want to Take Over a Botnet. In: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats (2012)","key":"4_CR19"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/EC2ND.2009.10","volume-title":"Proc. of the 2009 European Conference on Computer Network Defense","author":"B. Stock","year":"2009","unstructured":"Stock, B., Engelberth, M., Freiling, F.C., Holz, T.: Walowdac Analysis of a Peer-to-Peer Botnet. In: Proc. of the 2009 European Conference on Computer Network Defense, pp. 13\u201320. IEEE Computer Society, Washington, DC (2009)"},{"unstructured":"McNamee, K.: Malware Analysis Report: ZeroAccess\/Sirefef, Technical Report by Kindsight Security Labs (2012)","key":"4_CR21"},{"unstructured":"Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In: Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (2008)","key":"4_CR22"},{"unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: A Foray into Conficker\u2019s Logic and Rendezvous Points. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats (2009)","key":"4_CR23"},{"key":"4_CR24","first-page":"635","volume-title":"Proc. of the 16th ACM Conference on Computer and Communications Security","author":"B. Stone-Gross","year":"2009","unstructured":"Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your Botnet is My Botnet: Analysis of a Botnet Takeover. In: Proc. of the 16th ACM Conference on Computer and Communications Security, pp. 635\u2013647. ACM, New York (2009)"},{"unstructured":"Jonell, B., Joey, C., Ryan, F.: Infiltrating waledac botnet\u2019s convert operation[EB]. Trend Micro (2009), http:\/\/us.trendmicro.com\/imperia\/md\/content\/us\/pdf\/threats\/securitylibrary\/infiltrating_the_waledac_botnet_v2.pdf (June 10, 2011)","key":"4_CR25"},{"unstructured":"APT1: Exposing One of China\u2019s Cyber Espionage Units, http:\/\/intelreport.mandiant.com\/Mandiant_APT1_Report.pdf","key":"4_CR26"},{"unstructured":"Amini, P., Pierce, C.: Kraken Botnet Infiltration [EB]. Blog on DVLabs (2008), http:\/\/dvlabs.tippingpoint.com (June 10, 2011)","key":"4_CR27"},{"unstructured":"Barrett, B.: http:\/\/gizmodo.com\/gaming-network-employee-turns-14-000-users-into-bitcoin-487054354","key":"4_CR28"},{"issue":"3","key":"4_CR29","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/TDSC.2013.10","volume":"10","author":"K. Xu","year":"2013","unstructured":"Xu, K., Butler, P., Saha, S., Yao, D.: DNS for Massive-scale Command and Control. IEEE Transactions of Dependable and Secure Computing (TDSC)\u00a010(3), 143\u2013153 (2013)","journal-title":"IEEE Transactions of Dependable and Secure Computing (TDSC)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04283-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T06:09:00Z","timestamp":1746079740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-04283-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319042824","9783319042831"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04283-1_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}