{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:10:13Z","timestamp":1749787813306,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_26","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"471-478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic"],"prefix":"10.1007","author":[{"given":"T.","family":"Harsha","sequence":"first","affiliation":[]},{"given":"S.","family":"Asha","sequence":"additional","affiliation":[]},{"given":"B.","family":"Soniya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/SURV.2013.091213.00134","volume":"16","author":"S Khattak","year":"2013","unstructured":"Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection and defense. IEEE J. Commun. Surv. Tutorials 16(2), 898\u2013924 (2013)","journal-title":"IEEE J. Commun. Surv. Tutorials"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/j.jare.2013.11.005","volume":"5","author":"JMF Moura","year":"2014","unstructured":"Moura, J.M.F.: An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic. J. Adv. Res. 5, 435\u2013448 (2014)","journal-title":"J. Adv. Res."},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Eslahi, M., et al.: Periodicity classification of HTTP traffic to detect HTTP Botnets. In: 2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE (2015)","DOI":"10.1109\/ISCAIE.2015.7298339"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.cose.2013.04.007","volume":"39","author":"D Zhao","year":"2013","unstructured":"Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39, 2\u201316 (2013). Elsevier","journal-title":"Comput. Secur."},{"key":"26_CR5","unstructured":"Bacher, P., Holz, T., Kotter, M., Wicherski, G.: Know your enemy: tracking botnets (using honeynets to learn more about bots). Technical report, The Honeynet Project (2008)"},{"key":"26_CR6","unstructured":"Goebel, J., Holz, T.: Rishi: identify bot contaminated hosts by IRC nickname evaluation. In: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Berkeley, CA, USA, p. 8. USENIX Association"},{"issue":"16","key":"26_CR7","first-page":"1569","volume":"27","author":"JM Est\u00e9vez-Tapiador","year":"2004","unstructured":"Est\u00e9vez-Tapiador, J.M., Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J.E.: Anomaly detection methods in wired networks: a survey and taxonomy. Comput. Netw. 27(16), 1569\u20131584 (2004)","journal-title":"Comput. Netw."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Choi, H., Lee, H., Lee, H., Kim, H.: Botnet detection by monitoring group activities in DNS traffic. In: 7th IEEE International Conference on Computer and Information Technology, CIT 2007, pp. 715\u2013720, October 2007","DOI":"10.1109\/CIT.2007.90"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., Wang, L.: On the analysis of the Zeus botnet crimeware toolkit. In: 2010 Eighth Annual International Conference on Proceedings of the Privacy Security and Trust (PST), pp. 31\u201338 (2010)","DOI":"10.1109\/PST.2010.5593240"},{"key":"26_CR10","unstructured":"Li, C., Jiang, W., Zou, X.: Botnet: survey and case study. IEEE (2009). ISBN 978\u20130- 7695-38730"},{"key":"26_CR11","unstructured":"Weisstein, E.W.: Absolute frequency (2015). http:\/\/mathworld.wolfram.com\/AbsoluteFrequency.html"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Wei, L., Tavallaee, M., Rammidi, G., Ghorbani, A.A.: BotCop: an online botnet traffic classifier. In: Proceedings of the Communication Networks and Services Research Conference, CNSR 2009, Seventh Annual, pp. 70\u201377 (2009)","DOI":"10.1109\/CNSR.2009.21"},{"key":"26_CR13","unstructured":"Shah, C.: Periodic connections to control server offer new way to detect botnets (2013). http:\/\/blogs.mcafee.com\/mcafee-labs\/periodiclinks-to-control-server-offer-new-way-to-detect-botnets"},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1016\/j.csda.2007.07.015","volume":"52","author":"S Dray","year":"2008","unstructured":"Dray, S.: On the number of principal components: a test of dimensionality based on measurements of similarity between matrices. Comput. Stat. Data Anal. 52, 2228\u20132237 (2008)","journal-title":"Comput. Stat. Data Anal."},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","volume":"45","author":"S Garcia","year":"2014","unstructured":"Garcia, S., Grill, M., Stiborek, H., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. J. 45, 100\u2013123 (2014). Elsevier","journal-title":"Comput. Secur. J."},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Livadas, C., Walsh, R., Lapsley, D., Timothy Strayer, W.: Using machine learning techniques to identify botnet traffic. Project report (2007)","DOI":"10.1109\/LCN.2006.322210"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Tegeler, F., Fu, X., Vigna, G., Kruegel, C.: BotFinder: finding bots in network traffic without deep packet inspection. Proceedings (2012)","DOI":"10.1145\/2413176.2413217"},{"key":"26_CR18","unstructured":"Gu, G., Zhang, J., Lee, W.: BotSniffer \u2013 detecting botnet command and control channels in network traffic. In: Proceedings of the Internet Society (ISOC), San Diego (2008)"},{"key":"26_CR19","unstructured":"Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: detecting malware infection through IDS-driven dialog correlation. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T20:41:54Z","timestamp":1749760914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}