{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:39:02Z","timestamp":1771699142406,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540858843","type":"print"},{"value":"9783540858867","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85886-7_10","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T12:45:42Z","timestamp":1221655542000},"page":"146-160","source":"Crossref","is-referenced-by-count":30,"title":["Antisocial Networks: Turning a Social Network into a Botnet"],"prefix":"10.1007","author":[{"given":"Elias","family":"Athanasopoulos","sequence":"first","affiliation":[]},{"given":"A.","family":"Makridakis","sequence":"additional","affiliation":[]},{"given":"S.","family":"Antonatos","sequence":"additional","affiliation":[]},{"given":"D.","family":"Antoniades","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"K. G.","family":"Anagnostakis","sequence":"additional","affiliation":[]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Facebook Analytics and Advertising, \n                    \n                      http:\/\/adonomics.com"},{"key":"10_CR2","unstructured":"Facebook Statistics, \n                    \n                      http:\/\/www.facebook.com\/press\/info.php?statistics"},{"key":"10_CR3","unstructured":"Geo IP Tool, \n                    \n                      http:\/\/www.geoiptool.com"},{"key":"10_CR4","unstructured":"Hackers crash the Social Networking Party, \n                    \n                      http:\/\/www.pcworld.com\/article\/id,127347-page,1-c,internettips\/article.html"},{"key":"10_CR5","unstructured":"Identity \u2019at risk\u2019 on Facebook, \n                    \n                      http:\/\/news.bbc.co.uk\/2\/hi\/programmes\/click_online\/7375772.stm"},{"key":"10_CR6","unstructured":"National Geographic Content Usage, \n                    \n                      http:\/\/www.nationalgeographic.com\/community\/terms.html#content"},{"key":"10_CR7","unstructured":"National Geographic Photo of the Day Utility, \n                    \n                      http:\/\/photography.nationalgeographic.com\/photography\/photo-of-the-day"},{"key":"10_CR8","unstructured":"Photo of the Day, \n                    \n                      http:\/\/www.facebook.com\/apps\/application.php?id=8752912084"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Ahn, Y.-Y., Han, S., Kwak, H., Moon, S., Jeong, H.: Analysis of Topological Characteristics of Huge Online Social Networking Sites. In: Proceedings of the 16th International Conference on World Wide Web, (May 2007)","DOI":"10.1145\/1242572.1242685"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11767480_9","volume-title":"Applied Cryptography and Network Security","author":"E. Athanasopoulos","year":"2006","unstructured":"Athanasopoulos, E., Anagnostakis, K.G., Markatos, E.P.: Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 130\u2013145. Springer, Heidelberg (2006)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Huttenlocher, D., Kleinberg, J., Lan, X.: Group Formation in Large Social Networks: Membership, Growth, and Evolution. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2006), (August 2006)","DOI":"10.1145\/1150402.1150412"},{"key":"10_CR12","unstructured":"Defrawy, K.E., Gjoka, M., Markopoulou, A.: Bottorrent: Misusing bittorrent to launch ddos attacks. In: Proceedings of the USENIX 3rd Workshop on Steps Towards Reducing Unwanted Traffic on the Internet (SRUTI) (2007)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1145\/1124772.1124861","volume-title":"CHI 2006: Proceedings of the SIGCHI conference on Human Factors in com puting systems","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: CHI 2006: Proceedings of the SIGCHI conference on Human Factors in com puting systems, pp. 581\u2013590. ACM Press, New York (2006)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"key":"10_CR15","unstructured":"Halavais, A.: The Slashdot Effect: Analysis of a Large-Scale Public Conversation on the World Wide Web (2001)"},{"issue":"10","key":"10_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"T.N. Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM\u00a050(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1145\/1180405.1180434","volume-title":"CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security","author":"V.T. Lam","year":"2006","unstructured":"Lam, V.T., Antonatos, S., Akritidis, P., Anagnostakis, K.G.: Puppetnets: misusing web browsers as a distributed attack infrastructure. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security, pp. 221\u2013234. ACM, New York (2006)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Drushcel, P., Bhattacharjee, B.: Measurement and Analysis of Online Social Networks. In: Proceedings of the Internet Measurements Conference (IMC 2007) (2007)","DOI":"10.1145\/1298306.1298311"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1146847.1146894","volume-title":"InfoScale 2006: Proceedings of the 1st international conference on Scalable information systems","author":"N. Naoumov","year":"2006","unstructured":"Naoumov, N., Ross, K.: Exploiting P2P systems for DDoS attacks. In: InfoScale 2006: Proceedings of the 1st international conference on Scalable information systems, p. 47. ACM Press, New York (2006)"},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V. Paxson","year":"2001","unstructured":"Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput. Commun. Rev.\u00a031(3), 38\u201347 (2001)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Steiner, M., Biersack, E.W., En-Najjary, T.: Exploiting kad: Possible uses and misuses. Computer Communication Review\u00a037(5) (2007)","DOI":"10.1145\/1290168.1290176"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85886-7_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:53:48Z","timestamp":1619524428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85886-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540858843","9783540858867"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85886-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}