{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:05:54Z","timestamp":1768417554562,"version":"3.49.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319663319","type":"print"},{"value":"9783319663326","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66332-6_21","type":"book-chapter","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T07:58:05Z","timestamp":1507708685000},"page":"472-493","source":"Crossref","is-referenced-by-count":15,"title":["Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Vissers","sequence":"first","affiliation":[]},{"given":"Jan","family":"Spooren","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Agten","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Jumpertz","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Janssen","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Van Wesemael","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]},{"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,12]]},"reference":[{"key":"21_CR1","unstructured":"Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for DNS. In: Proceedings of the 19th USENIX Conference on Security, p. 18 (2010)"},{"key":"21_CR2","unstructured":"Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou II., N., Dagon, D.: Detecting malware domains at the upper DNS hierarchy. In: Proceedings of the 20th USENIX Conference on Security, p. 27"},{"issue":"4","key":"21_CR3","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/2584679","volume":"16","author":"L Bilge","year":"2014","unstructured":"Bilge, L., Sen, S., Balzarotti, D., Kirda, E., Kruegel, C.: Exposure: a passive DNS analysis service to detect and report malicious domains. ACM Trans. Inf. Syst. Secur. (TISSEC) 16(4), 14 (2014)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-642-15512-3_23","volume-title":"Recent Advances in Intrusion Detection","author":"M Cova","year":"2010","unstructured":"Cova, M., Leita, C., Thonnard, O., Keromytis, A.D., Dacier, M.: An analysis of rogue AV campaigns. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 442\u2013463. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15512-3_23"},{"key":"21_CR5","unstructured":"Felegyhazi, M., Kreibich, C., Paxson, V.: On the potential of proactive domain blacklisting. In: Proceedings of the 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, p. 6 (2010)"},{"key":"21_CR6","unstructured":"FortiGuard Center: Antispam - IP & Signature Lookup (2017). https:\/\/www.fortiguard.com\/more\/antispam"},{"key":"21_CR7","unstructured":"Google: Google Safe Browsing (2016). https:\/\/developers.google.com\/safe-browsing\/"},{"key":"21_CR8","unstructured":"Google: Unwanted Software Policy (2016). https:\/\/www.google.com\/about\/company\/unwanted-software-policy.html"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Hao, S., Feamster, N., Pandrangi, R.: Monitoring the initial DNS behavior of malicious domains. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 269\u2013278. ACM (2011)","DOI":"10.1145\/2068816.2068842"},{"key":"21_CR10","unstructured":"Hao, S., Kantchelian, A., Miller, B., Paxson, V., Feamster, N.: Predator: Proactive recognition and elimination of domain abuse at time-of-registration"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Hao, S., Thomas, M., Paxson, V., Feamster, N., Kreibich, C., Grier, C., Hollenbeck, S.: Understanding the domain registration behavior of spammers. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 63\u201376 (2013)","DOI":"10.1145\/2504730.2504753"},{"key":"21_CR12","series-title":"Springer Series in Statistics","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-21606-5","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2001","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. Springer Series in Statistics. Springer, New York (2001)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., F\u00e9legyh\u00e1zi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G.M., Savage, S.: Click trajectories: end-to-end analysis of the spam value chain. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP 2011, pp. 431\u2013446. IEEE Computer Society, Washington, DC (2011). http:\/\/dx.doi.org\/10.1109\/SP.2011.24","DOI":"10.1109\/SP.2011.24"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Moura, G.C., M\u00fcller, M., Wullink, M., Hesselman, C.: nDEWS: a new domains early warning system for TLDs. In: NOMS 2016\u20132016 IEEE\/IFIP Network Operations and Management Symposium, pp. 1061\u20131066. IEEE (2016)","DOI":"10.1109\/NOMS.2016.7502961"},{"key":"21_CR15","unstructured":"Myles, P.: DomainWire Global TLD Report 2016\/2. https:\/\/www.centr.org\/library\/statistics-report\/domainwire-global-tld-report-2016-2.html"},{"key":"21_CR16","unstructured":"Pattanai: Faker is a PHP library that generates fake data for you. https:\/\/github.com\/teepluss\/laravel-faker"},{"key":"21_CR17","unstructured":"Plohmann, D., Yakdan, K., Klatt, M., Bader, J., Gerhards-Padilla, E.: A comprehensive measurement study of domain generating malware. In: 25th USENIX Security Symposium, pp. 263\u2013278 (2016)"},{"key":"21_CR18","unstructured":"Scikit-learn developers: Encoding categorical features (2017). http:\/\/scikit-learn.org\/stable\/modules\/preprocessing.html"},{"key":"21_CR19","unstructured":"Scikit-learn developers: Homogeneity, completeness and V-measure (2017). http:\/\/scikit-learn.org\/stable\/modules\/clustering.html"},{"key":"21_CR20","unstructured":"SURBL: SURBL - URI Reputation Data (2016). http:\/\/www.surbl.org"},{"key":"21_CR21","unstructured":"The Spamhaus Project Ltd: The Domain Block List (2016). https:\/\/www.spamhaus.org\/dbl\/"},{"key":"21_CR22","unstructured":"Twilio: Lookup (2017). https:\/\/www.twilio.com\/lookup"},{"key":"21_CR23","unstructured":"URL Void: Website Reputation Checker Tool (2016). http:\/\/www.urlvoid.com\/"},{"key":"21_CR24","unstructured":"Vixie, P.: Domain name abuse: how cheap new domain names fuel the eCrime economy. Presentation at RSA Conference 2015 (2015)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66332-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T09:19:15Z","timestamp":1570180755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66332-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663319","9783319663326"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66332-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}