{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:11:53Z","timestamp":1761401513898,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642149917"},{"type":"electronic","value":"9783642149924"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14992-4_20","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T12:42:07Z","timestamp":1281357727000},"page":"216-230","source":"Crossref","is-referenced-by-count":9,"title":["A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets"],"prefix":"10.1007","author":[{"given":"David","family":"Dittrich","sequence":"first","affiliation":[]},{"given":"Felix","family":"Leder","sequence":"additional","affiliation":[]},{"given":"Tillmann","family":"Werner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"45 CFR 46, http:\/\/www.hhs.gov\/ohrp\/humansubjects\/guidance\/45cfr46.htm"},{"key":"20_CR2","unstructured":"Estonia urges firm EU, NATO response to new form of warfare: cyber-attacks (May 2007), http:\/\/www.smh.com.au\/news\/Technology\/Estonia-urges-firm-EU-NATO-response-to-new-form-of-warfarecyberattacks\/2007\/05\/16\/1178995207414.html"},{"key":"20_CR3","unstructured":"On-demand detection of malicious software. Technical Report No. 23, Anti-Virus Comparative (August 2009)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","volume-title":"Recent Advances in Intrusion Detection","author":"M. Bailey","year":"2007","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol.\u00a04637, pp. 178\u2013197. Springer, Heidelberg (2007)"},{"key":"20_CR5","unstructured":"Chiang, K., Lloyd, L.: A case study of the rustock rootkit and spam bot. In: HotBots 2007: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets (2007)"},{"key":"20_CR6","unstructured":"N.\u00a0R.\u00a0C. Committee on Guidelines\u00a0for Human Embryonic Stem Cell\u00a0Research. Guidelines for Human Embryonic Stem Cell Research. The National Academies Press, Washington (2005)"},{"key":"20_CR7","unstructured":"Criscuolo, P.J.: Distributed denial of service. Technical report, Department of Energy, Computer Incident Advisory Capability (CIAC) (February 2000)"},{"key":"20_CR8","unstructured":"Danchev, D.: Legal concerns stop researchers from disrupting the storm worm botnet (January 2009), http:\/\/blogs.zdnet.com\/security\/?p=2397"},{"key":"20_CR9","unstructured":"Deibert, R., Manchanda, A., Rohozinski, R., Villeneuve, N., Walton, G.: Tracking GhostNet: Investigating a cyber espionage network (March 2009), http:\/\/www.scribd.com\/doc\/13731776\/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: The ethics of cyber conflict. In: The Handbook of Information and Computer Ethics, ch.\u00a017 (June 2008)","DOI":"10.1002\/9780470281819.ch17"},{"key":"20_CR11","unstructured":"Dittrich, D.: Second Agora workshop on Active Defense (Sponsored by Cisco Systems, Inc.) (September 2003), http:\/\/staff.washington.edu\/dittrich\/arc\/AD-workshop-091203.pdf"},{"key":"20_CR12","unstructured":"Dittrich, D., Bailey, M., Dietrich, S.: Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research. Poster to be presented at the 16th ACM Conference on Computer and Communication Security (November 2009)"},{"key":"20_CR13","unstructured":"Dittrich, D., Bailey, M., Dietrich, S.: Towards Community Standards for Ethical Behavior in Computer Security Research. Technical Report CS 2009-01, Stevens Institute of Technology (April 2009)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Dittrich, D., Dietrich, S.: P2P as botnet command and control: a deeper insight. In: Proceedings of the 3rd International Conference on Malicious and Unwanted Software (Malware 2008), pp. 46\u201363 (October 2008)","DOI":"10.1109\/MALWARE.2008.4690856"},{"key":"20_CR15","unstructured":"Dittrich, D., Himma, K.E.: Active Response to Computer Intrusions. In: Handbook of Information Security, ch.\u00a0182, vol. III (2005), http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=790585"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"20_CR17","unstructured":"Enright, B., Voelker, G., Savage, S., Kanich, C., Levchenko, K.: Storm: When researchers collide. In: USENIX; login, vol.\u00a033(4) (August 2008)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: A case-study of keyloggers and dropzones. Technical Report TR-2008-006, Department for Mathematics and Computer Science, University of Mannheim (December 2008)","DOI":"10.1007\/978-3-642-04444-1_1"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: A case-study of keyloggers and dropzones. In: Reihe Informatik (2008)","DOI":"10.1007\/978-3-642-04444-1_1"},{"key":"20_CR20","unstructured":"Holz, T., Steiner, M., Dahl, F., Biersack, E.W., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: LEET 2008: First USENIX Workshop on Large-Scale Exploits and Emergent Threats (April 2008)"},{"key":"20_CR21","unstructured":"John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying Spamming Botnets Using Botlab. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2009) (April 2009)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security, pp. 3\u201314 (2008)","DOI":"10.1145\/1455770.1455774"},{"key":"20_CR23","unstructured":"Kelly, S.: BBC team exposes cyber crime risk (March 2009), http:\/\/news.bbc.co.uk\/2\/hi\/programmes\/click_online\/7932816.stm"},{"key":"20_CR24","unstructured":"Leder, F., Werner, T.: Know Your Enemy: Containing Conficker (April 2009), https:\/\/www.honeynet.org\/papers\/conficker\/"},{"key":"20_CR25","unstructured":"Leder, F., Werner, T., Martini, P.: Proactive Botnet Countermeasures \u2013 An Offensive Approach. In: Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia (March 2009)"},{"key":"20_CR26","unstructured":"Leyden, J.: DDoS protection racket targets online bookies (November 2001), http:\/\/www.theregister.co.uk\/2001\/11\/26\/ddos_protection_racket_targets_online\/"},{"issue":"2","key":"20_CR27","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3172\/JIE.15.2.37","volume":"15","author":"A. Markham","year":"2006","unstructured":"Markham, A.: Method as ethic, ethic as method. Journal of Information Ethics\u00a015(2), 37\u201355 (2006)","journal-title":"Journal of Information Ethics"},{"key":"20_CR28","unstructured":"Naraine, R.: Kraken botnet infiltration triggers ethics debate (May 2008), http:\/\/www.eweek.com\/c\/a\/Security\/Kraken-Botnet-Infiltration-Triggers-Ethics-Debate\/"},{"key":"20_CR29","unstructured":"Department of Justice. Criminal Complaint: United States of America v. Paul G. Ashley, Jonathan David Hall, Joshua James Schichtel, Richard Roby and Lee Graham Walker (2004), http:\/\/www.reverse.net\/operationcyberslam.pdf"},{"key":"20_CR30","unstructured":"Office for Human Research Protections (OHRP). Guidance on Certificates of Confidentiality (February 2003), http:\/\/www.hhs.gov\/ohrp\/humansubjects\/guidance\/certconf.htm"},{"key":"20_CR31","unstructured":"Oudot, L.: Fighting Internet Worms With Honeypots (October 2003), http:\/\/www.securityfocus.com\/infocus\/1740"},{"key":"20_CR32","unstructured":"Phong, H.: Korean agency accuses BKIS of violating local and int\u2019l. law (July 2007), http:\/\/english.vietnamnet.vn\/reports\/2009\/07\/859068\/"},{"key":"20_CR33","unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: Conficker C P2P Protocol and Implementation (September 2009)"},{"key":"20_CR34","unstructured":"Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging (April 2007)"},{"key":"20_CR35","unstructured":"Shachtman, N.: Porn purveyors getting squeezed (July 2003), http:\/\/www.wired.com\/news\/print\/0,1294,59574,00.html"},{"key":"20_CR36","first-page":"125","volume-title":"Computers, Ethics & Social Values","author":"E.H. Spafford","year":"1992","unstructured":"Spafford, E.H.: Are computer hacker break-ins ethical. In: Johnson, D.G., Nissenbaum, H. (eds.) Computers, Ethics & Social Values, pp. 125\u2013135. Oxford University Press, Oxford (1992)"},{"key":"20_CR37","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, August 2002, pp. 149\u2013170 (2002)"},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your Botnet is My Botnet: Analysis of a Botnet Takeover. Technical report, University of California (May 2009)","DOI":"10.1145\/1653662.1653738"},{"key":"20_CR39","unstructured":"Symantec. The Downadup Codex: A comprehensive guide to the threat\u2019s mechanics Edition 2.0 (June 2009), http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/the_downadup_codex_ed2.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14992-4_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T23:37:54Z","timestamp":1740353874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14992-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642149917","9783642149924"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14992-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}