{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:55:23Z","timestamp":1725566123531},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642152108"},{"type":"electronic","value":"9783642152115"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15211-5_26","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T11:38:15Z","timestamp":1284982695000},"page":"247-252","source":"Crossref","is-referenced-by-count":1,"title":["Simulation of Botnets: Agent-Based Approach"],"prefix":"10.1007","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[]},{"given":"Alexey","family":"Konovalov","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Shorov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Xu, Y., Karir, M.: A Survey of Botnet Technology and Defenses. In: The 2009 Cybersecurity Applications & Technology Conference for Homeland Security (2009)","DOI":"10.1109\/CATCH.2009.40"},{"key":"26_CR2","unstructured":"Binkley, J.R., Singh, S.: An algorithm for anomaly-based botnet detection. In: SRUTI 2006, San Jose, CA (2006)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Cohen, P., Levesque, H.J.: \u00d3eamwork, Nous, No. 35 (1991)","DOI":"10.2307\/2216075"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Dagon, D., Gu, G., Lee, C.P., Lee, W.: A taxonomy of botnet structures. In: ACSAC 2007, Florida, USA (2007)","DOI":"10.1109\/ACSAC.2007.44"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Gamer, T., Scharf, M.: Realistic Simulation Environments for IP-based Networks. In: The First International Workshop on OMNeT++, Marseille, France (2008)","DOI":"10.4108\/ICST.SIMUTOOLS2008.3079"},{"key":"26_CR6","unstructured":"Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-Peer Botnets: Overview and case study. In: HotBots 2007, Cambridge, MA (2007)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Grosz, B., Kraus, S.: Collaborative Plans for Complex Group Actions. Artificial Intelligence\u00a086(2) (1996)","DOI":"10.1016\/0004-3702(95)00103-4"},{"key":"26_CR8","unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Security 2008, San Jose, CA (2008)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Ulanov, A.: Agent Teams in Cyberspace: Security Guards in the Global Internet. In: The International Conference on CYBERWORLDS (2006)","DOI":"10.1109\/CW.2006.12"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Liu, J., Xiao, Y., Ghaboosi, K., Deng, H., Zhang, J.: Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures. EURASIP Journal on Wireless Communications and Networking\u00a02009 (2009)","DOI":"10.1155\/2009\/692654"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Macal, C.M., North, M.J.: Tutorial on Agent-based Modeling and Simulation. In: The 2005 Winter Simulation Conference (2005)","DOI":"10.1109\/WSC.2005.1574234"},{"key":"26_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/3-540-36483-8_9","volume-title":"Multi-Agent-Based Simulation II","author":"M. Marietto","year":"2002","unstructured":"Marietto, M., David, N., Sichman, J.S., Coelho, H.: Requirements Analysis of Agent-Based Simulation Platforms: State of the Art and New Prospects. In: Sichman, J.S., Bousquet, F., Davidsson, P. (eds.) MABS 2002. LNCS (LNAI), vol.\u00a02581, pp. 125\u2013141. Springer, Heidelberg (2002)"},{"key":"26_CR13","volume-title":"Internet Denial of Service: Attack and Defense Mechanisms","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR, Englewood Cliffs (2004)"},{"key":"26_CR14","unstructured":"Mirkovic, J., Robinson, M., Reiher, P., Oikonomou, G.: Distributed Defense Against DDOS Attacks. University of Delaware CIS Department Technical Report (2005)"},{"key":"26_CR15","unstructured":"OMNeT++ Community Site (2010), http:\/\/www.omnetpp.org\/"},{"key":"26_CR16","unstructured":"Papadopoulos, C., Lindell, R., Mehringer, I., Hussain, A., Govindan, R.: Cossack: Coordinated suppression of simultaneous attacks. DISCEX III (2003)"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet Detection Based on Network Behavior. In: Advances in Information Security. Botnet Detection, vol.\u00a036 (2008)","DOI":"10.1007\/978-0-387-68768-1_1"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Tambe, M., Bowring, E., Jung, H., et al.: Conflicts in teamwork: Hybrids to the rescue. In: AAMAS 2005 (2005)","DOI":"10.1145\/1082473.1082474"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15211-5_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:02:41Z","timestamp":1606186961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15211-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152108","9783642152115"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15211-5_26","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2010]]}}}