{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T13:21:47Z","timestamp":1769174507575,"version":"3.49.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319208091","type":"print"},{"value":"9783319208107","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_20","type":"book-chapter","created":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T23:47:00Z","timestamp":1434930420000},"page":"277-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Topology Based Flow Model for Computing Domain Reputation"],"prefix":"10.1007","author":[{"given":"Igor","family":"Mishsky","sequence":"first","affiliation":[]},{"given":"Nurit","family":"Gal-Oz","sequence":"additional","affiliation":[]},{"given":"Ehud","family":"Gudes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"20_CR1","unstructured":"Alexa: Websites Ranking (2014). \n                      https:\/\/www.alexa.com\/"},{"key":"20_CR2","unstructured":"Antonakakis, M., Perdisc, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation model for dns. In: USENIX Security Symposium, pp. 273\u2013290 (2010)"},{"key":"20_CR3","unstructured":"Antonakakis, M., Perdisci, R., Le, W.: Detecting malware domains at the upper dns hierarchy. In: USENIX Security Symposium (2011)"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.comnet.2011.07.018","volume":"56","author":"H Choi","year":"2012","unstructured":"Choi, H., Lee, H.: Identifying botnets by capturing group activities in dns traffic. Comput. Netw. 56, 20\u201333 (2012)","journal-title":"Comput. Netw."},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-39235-1_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Y Cohen","year":"2013","unstructured":"Cohen, Y., Gordon, D., Hendler, D.: Early detection of outgoing spammers in large-scale service provider networks. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 83\u2013101. Springer, Heidelberg (2013)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Coskun, B., Dietrich, S., Memon, N.D.: Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. In: ACSAC, pp. 131\u2013140 (2010)","DOI":"10.1145\/1920261.1920283"},{"key":"20_CR7","unstructured":"Cyren: A provider of cloud-based security solutions (2014). \n                      https:\/\/www.cyren.com\/"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW, pp. 640\u2013651 (2003)","DOI":"10.1145\/775152.775242"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrus. In: WWW, pp. 403\u2013412 (2004)","DOI":"10.1145\/988672.988727"},{"key":"20_CR10","unstructured":"Leyla, B., Engin, K., Christopher, K., Marco, B.: Exposure finding malicious domains using passive dns analysis. In: NDSS (2011)"},{"key":"20_CR11","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation for e-businesses. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences HICSS02, Washington, DC, USA, vol. 7, p. 188 (2002)"},{"key":"20_CR12","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: Pagerank citation ranking: bringing order to the web. In: Technical report. Stanford Digital Library Technologies Projext (1998)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Villamarin-Salomon, R., Brustolon, J.C.: Bayesian bot detection based on dns traffic similarity. In: SAC, pp. 2035\u20132041 (2009)","DOI":"10.1145\/1529282.1529734"},{"key":"20_CR14","unstructured":"VirusTotal: A free virus, malware and URL online scanning service (2014). \n                      https:\/\/www.virustotal.com\/"},{"key":"20_CR15","unstructured":"Whois: IP data (2014). \n                      https:\/\/who.is"},{"key":"20_CR16","volume-title":"Data Mining: Practical Machine Learning Tools and Techniquel","author":"I Witten","year":"2005","unstructured":"Witten, I., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniquel. Morgan Kaufmann, San Francisco (2005)"},{"key":"20_CR17","unstructured":"Wu, B., Goel, V., Davison, B.D.: Propagating trust and distrust to demote web spam. In: WWW Workshop on Models of Trust for the Web and MTW (2006)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Yadav, S., Reddy, A.K.K., Reddy, A.L.N., Ranjan, S.: Detecting algorithmically generated malicious domain names. In: Internet Measurement Conference, pp. 48\u201361 (2010)","DOI":"10.1145\/1879141.1879148"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:15:37Z","timestamp":1561148137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}