{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:40:14Z","timestamp":1740181214937,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642141706"},{"type":"electronic","value":"9783642141713"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14171-3_6","type":"book-chapter","created":{"date-parts":[[2010,6,12]],"date-time":"2010-06-12T11:34:46Z","timestamp":1276342486000},"page":"59-70","source":"Crossref","is-referenced-by-count":0,"title":["BotSpot: Anonymous and Distributed Malware Detection"],"prefix":"10.1007","author":[{"given":"P\u00e9ter","family":"Kenyeres","sequence":"first","affiliation":[]},{"given":"Attila","family":"Szentgy\u00f6rgyi","sequence":"additional","affiliation":[]},{"given":"Tam\u00e1s","family":"M\u00e9sz\u00e1ros","sequence":"additional","affiliation":[]},{"given":"G\u00e1bor","family":"Feh\u00e9r","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9-12","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1016\/j.peva.2007.06.014","volume":"64","author":"J. Erman","year":"2007","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Offline\/Realtime Traffic Classification Using Semi-Supervised Learning. Performance Evaluation\u00a064(9-12), 1194\u20131213 (2007)","journal-title":"Performance Evaluation"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Pelleg, D., Moore, A.: X-means: Extending K-means with efficient estimation of the number of clusters. In: 17th Int. Conf. on Machine Learning, pp. 727\u2013734 (2000)","DOI":"10.1007\/3-540-44491-2_3"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic Classification using Clustering Algorithms. In: SIGCOMM 2006 MineNet Workshop, Pisa, Italy (2006)","DOI":"10.1145\/1162678.1162679"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","volume-title":"Passive and Active Network Measurement","author":"A. McGregor","year":"2004","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow Clustering Using Machine Learning Techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 205\u2013214. Springer, Heidelberg (2004)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Zander, S., Nguyen, T., Armitage, G.: Automated Traffic Classification and Application Identification using Machine Learning. In: LCN 2005, Sydney, Australia (2005)","DOI":"10.1109\/LCN.2005.35"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attacks using history-based IP filtering. In: ICC, vol.\u00a01, pp. 482\u2013486 (2003)","DOI":"10.1007\/3-540-45067-X_19"},{"key":"6_CR7","first-page":"514","volume-title":"Int. World Wide Web Conf.","author":"F. Kargl","year":"2001","unstructured":"Kargl, F., Maier, J., Weber, M.: Protecting web servers from distributed denial of service attacks. In: Int. World Wide Web Conf., pp. 514\u2013524. ACM, Hong Kong (2001)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: Secure Overlay Services. In: ACM SIGCOMM, Pittsburgh, USA, pp. 61\u201372 (2002)","DOI":"10.1145\/964725.633032"},{"key":"6_CR9","first-page":"7","volume-title":"HotBots 2007","author":"A. Karasaridis","year":"2007","unstructured":"Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: HotBots 2007, p. 7. USENIX Association, Cambridge (2007)"},{"key":"6_CR10","volume-title":"HotBots 2007","author":"J. Goebel","year":"2007","unstructured":"Goebel, J., Holz, T.: Rishi: Identify bot contaminated hosts by irc nickname evaluation. In: HotBots 2007. USENIX Association, Cambridge (2007)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Livadas, C., Walsh, R., Lapsley, D., Strayer, W.T.: Using machine learning techniques to identify botnet traffic. In: 2nd IEEE LCN WoNS 2006, Tampa, USA (2006)","DOI":"10.1109\/LCN.2006.322210"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Masud, M.M., Gao, J., Khan, L., Han, J., Thuraisingham, B.: Peer to peer botnet detection for cyber-security: a data mining approach. In: 4th workshop on Cyber security and information intelligence research. ACM, Oak Ridge (2008)","DOI":"10.1145\/1413140.1413185"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","first-page":"207","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M.K. Reiter","year":"2008","unstructured":"Reiter, M.K., Yen, T.-F.: Traffic aggregation for malware detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.\u00a05137, pp. 207\u2013227. Springer, Heidelberg (2008)"},{"key":"6_CR14","doi-asserted-by":"crossref","first-page":"303","DOI":"10.3233\/JCS-2007-15301","volume":"15","author":"S. Wehner","year":"2007","unstructured":"Wehner, S.: Analyzing worms and network traffic using compression. Journal of Computer Security\u00a015, 303\u2013320 (2007)","journal-title":"Journal of Computer Security"},{"key":"6_CR15","unstructured":"Kreibich, C., Kanich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: On the Spam Campaign Trail. In: 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (2008)"},{"key":"6_CR16","unstructured":"Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting malware infection through ids-driven dialog correlation. In: Security 2007 (2007)"},{"key":"6_CR17","unstructured":"Sekar, V., Duffield, N., Spatscheck, O., Van Der Merwe, J., Zhang, H.: LADS: Large-scale Automated DDoS detection System. In: USENIX ATC, pp. 171\u2013184 (2006)"},{"key":"6_CR18","unstructured":"Gu, G., Zhang, J., Lee., W.: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. NDSS (2008)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Choi, H., Lee, H., Lee, H., Kim, H.: Botnet Detection by Monitoring Group Activities in DNS Traffic. In: IEEE CIT, Aizu-Wakamatsu, Japan, pp. 715\u2013720 (2007)","DOI":"10.1109\/CIT.2007.90"},{"key":"6_CR20","unstructured":"Cisco Systems NetFlow Services Export Version 9, RFC 3954 (2004)"},{"key":"6_CR21","unstructured":"Internet Relay Chat Protocol, RFC 1459 (1993)"},{"key":"6_CR22","unstructured":"A Simple Network Management Protocol (SNMP), RFC 1157 (1990)"},{"issue":"10","key":"6_CR23","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.micpro.2004.08.007","volume":"28","author":"A. Garg","year":"2004","unstructured":"Garg, A., Reddy, N.: Mitigation of DoS attacks through QoS regulation. Microprocessors and Microsystems\u00a028(10), 521\u2013530 (2004)","journal-title":"Microprocessors and Microsystems"},{"key":"6_CR24","unstructured":"Ramachandran, A., Feamster, M., Dagon, D.: Revealing botnet membership using dnsbl counter-intelligence. In: 2nd Workshop on SRUTI (2006)"},{"key":"6_CR25","volume-title":"Honeypots - Tracking hackers","author":"L. Spitzner","year":"2003","unstructured":"Spitzner, L.: Honeypots - Tracking hackers. Pearson Education, Inc., London (2003)"},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S. Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Computing Surveys (CSUR)\u00a036, 335\u2013371 (2004)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Turrini, E., Panzieri, F.: Using P2P Techniques for Content Distribution Internetworking: A Research Proposal. In: 2th Int. Conf. on P2P Computing, p. 171 (2002)","DOI":"10.1109\/PTP.2002.1046330"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14171-3_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:06:47Z","timestamp":1740179207000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14171-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642141706","9783642141713"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14171-3_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}