{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T08:29:36Z","timestamp":1743841776759,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319121598"},{"type":"electronic","value":"9783319121604"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12160-4_28","type":"book-chapter","created":{"date-parts":[[2014,10,18]],"date-time":"2014-10-18T11:14:47Z","timestamp":1413630887000},"page":"469-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts"],"prefix":"10.1007","author":[{"given":"Jiyoung","family":"Woo","sequence":"first","affiliation":[]},{"given":"Hyun Jae","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Ah Reum","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Hyukmin","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Huy Kang","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,19]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-009-0127-3","volume":"6","author":"S Tricaud","year":"2010","unstructured":"Tricaud, S., Saad\u00e9, P.: Applied parallel coordinates for logs and network traffic attack analysis. J. Comput. Virol. 6, 1\u201329 (2010)","journal-title":"J. Comput. Virol."},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.cose.2008.12.003","volume":"28","author":"H Choi","year":"2009","unstructured":"Choi, H., Lee, H., Kim, H.: Fast detection and visualization of network attacks on parallel coordinates. Comput. Secur. 28, 276\u2013288 (2009)","journal-title":"Comput. Secur."},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCG.2006.34","volume":"26","author":"T Itoh","year":"2006","unstructured":"Itoh, T., Takakura, H., Sawada, A., Koyamada, K.: Hierarchical visualization of network intrusion detection data. Comput. Graph. Appl. IEEE 26, 40\u201347 (2006)","journal-title":"Comput. Graph. Appl. IEEE"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: VisFlowConnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 26\u201334 (2004)","DOI":"10.1145\/1029208.1029214"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Conti, G., Abdullah, K.: Passive visual fingerprinting of network attack tools. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 45\u201354 (2004)","DOI":"10.1145\/1029208.1029216"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/1402946.1402979","volume":"38","author":"Y Xie","year":"2008","unstructured":"Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. ACM SIGCOMM Comput. Commun. Rev. 38, 171\u2013182 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"28_CR7","unstructured":"John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying spamming botnets using botlab. In: NSDI\u201909 Proceedings of the 6th USENIX Symposium on Netwoked Systems Design and Implementation, vol. 9, pp. 291\u2013306 (2009)"},{"key":"28_CR8","unstructured":"Li, F., Hsieh, M.-h.: An empirical study of clustering behavior of spammers and groupbased anti-spam strategies. In: CEAS 2006 Third Conference on Email and AntiSpam (2006)"},{"key":"28_CR9","unstructured":"Zhuang, L., Dunagan, J., Simon, D.R., Wang, H.J., Tygar, J.: Characterizing botnets from email spam records. In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)"},{"key":"28_CR10","unstructured":"Zhao, Y., Xie, Y., Yu, F., Ke, Q., Yu, Y., Chen, Y., Gillum, E.: BotGraph: large scale spamming botnet detection. In: NSDI\u201909 Proceedings of the 6th USENIX Symposium on Netwoked Systems Design and Implementation, vol. 9, pp. 321\u2013334 (2009)"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Sroufe, P., Phithakkitnukoon, S., Dantu, R., Cangussu, J.: Email shape analysis for spam botnet detection. In: Proceedings of IEEE Consumer Communications and Networking Conference, 2009 (2009)","DOI":"10.1109\/CCNC.2009.4784781"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Pathak, A., Qian, F., Hu, Y.C., Mao, Z.M., Ranjan, S.: Botnet spam campaigns can be long lasting: evidence, implications, and analysis. In: Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, pp. 13\u201324 (2009)","DOI":"10.1145\/1555349.1555352"},{"key":"28_CR13","first-page":"1445","volume":"6","author":"H Jeong","year":"2012","unstructured":"Jeong, H., Kim, H.K., Lee, S., Kim, E.: Detection of Zombie PCs based on email spam analysis. KSII Trans. Internet Inf. Syst. (TIIS) 6, 1445\u20131462 (2012)","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"28_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03610927408827101","volume":"3","author":"T Calinski","year":"1974","unstructured":"Calinski, T., Harabasz, J.: A dendrite method for cluster analysis. Commun. Stat.-Theor. Methods 3, 1\u201327 (1974)","journal-title":"Commun. Stat.-Theor. Methods"},{"key":"28_CR15","unstructured":"Sarle, W.: SAS Technical Report A-108 (1983)"},{"key":"28_CR16","unstructured":"Symantec Corporation: Internet Security Threat Report 2013, vol. 18 (2013)"},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-28349-8_2","volume-title":"Grouping Multidimensional Data","author":"P Berkhin","year":"2006","unstructured":"Berkhin, P.: A survey of clustering data mining techniques. In: Kogan, J., Nicholas, C., Teboulle, M. (eds.) Grouping Multidimensional Data, pp. 25\u201371. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology -- ICISC 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12160-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T21:34:20Z","timestamp":1676583260000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12160-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319121598","9783319121604"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12160-4_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"19 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}