{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:54:12Z","timestamp":1742914452955,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214837"},{"type":"electronic","value":"9783642214844"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21484-4_1","type":"book-chapter","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T06:43:37Z","timestamp":1308638617000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["Cleaning Your House First: Shifting the Paradigm on How to Secure Networks"],"prefix":"10.1007","author":[{"given":"J\u00e9r\u00f4me","family":"Fran\u00e7ois","sequence":"first","affiliation":[]},{"given":"Giovane C. M.","family":"Moura","sequence":"additional","affiliation":[]},{"given":"Aiko","family":"Pras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Arbor networks. Worldwide infrastructure security report (2009 report). Technical report (2010)"},{"key":"1_CR2","first-page":"291","volume-title":"NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation","author":"J.P. John","year":"2009","unstructured":"John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying spamming botnets using Botlab. In: NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 291\u2013306. USENIX Association, Berkeley (2009)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-13971-0_18","volume-title":"Networked Services and Applications - Engineering, Control and Management","author":"W.W. Vries de","year":"2010","unstructured":"de Vries, W.W., Moreira Moura, G.C., Pras, A.: Fighting spam on the sender side: A lightweight approach. In: Aagesen, F.A., Knapskog, S.J. (eds.) EUNICE 2010. LNCS, vol.\u00a06164, pp. 188\u2013197. Springer, Heidelberg (2010)"},{"key":"1_CR4","unstructured":"van Eeten, M., Bauerb, J.M., Asgharia, H., Tabatabaiea, S., Randc, D.: The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. In: WEIS 2010: Ninth Workshop on the Economics of Information Security (2010)"},{"key":"1_CR5","unstructured":"Cisco Systems. Cisco IOS NetFlow (August 2010)"},{"issue":"3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A. Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys Tutorials\u00a012(3), 343\u2013356 (2010)","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/1402946.1402979","volume":"38","author":"Y. Xie","year":"2008","unstructured":"Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. SIGCOMM Comput. Commun. Rev.\u00a038(4), 171\u2013182 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"1_CR8","unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: USENIX Security Symposium (SS), San Jose, CA, pp. 139\u2013154 (July 2008)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-03700-9_22","volume-title":"The Internet of the Future","author":"A. Sperotto","year":"2009","unstructured":"Sperotto, A., Vliek, G., Sadre, R., Pras, A.: Detecting spam at the network level. In: Oliver, M., Sallent, S. (eds.) EUNICE 2009. LNCS, vol.\u00a05733, pp. 208\u2013216. Springer, Heidelberg (2009)"},{"issue":"1","key":"1_CR10","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/BF01890115","volume":"1","author":"W.H. Day","year":"1984","unstructured":"Day, W.H., Edelsbrunner, H.: Efficient algorithms for agglomerative hierarchical clustering methods. Journal of Classification\u00a01(1), 7\u201324 (1984)","journal-title":"Journal of Classification"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Schikuta, E.: Grid-clustering: a fast hierarchical clustering method for very large data sets. In: Proceedings 15th Int. Conf. on Pattern Recognition, pp. 101\u2013105 (1996)","DOI":"10.1109\/ICPR.1996.546732"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/978-3-642-04342-0_10","volume-title":"RAID 2009","author":"J. Fran\u00e7ois","year":"2009","unstructured":"Fran\u00e7ois, J., Abdelnur, H., State, R., Festor, O.: Automated Behavioral Fingerprinting. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol.\u00a05758, pp. 182\u2013201. Springer, Heidelberg (2009)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-04968-2_4","volume-title":"IP Operations and Management","author":"A. Sperotto","year":"2009","unstructured":"Sperotto, A., Sadre, R., van Vliet, F., Pras, A.: A Labeled Data Set for Flow-Based Intrusion Detection. In: Nunzi, G., Scoglio, C., Li, X. (eds.) IPOM 2009. LNCS, vol.\u00a05843, pp. 39\u201350. Springer, Heidelberg (2009)"},{"key":"1_CR14","unstructured":"Porras, P., Sadi, H., Yegneswaran, V.: A Multi-perspective Analysis of the Storm (Peacomm) Worm"},{"issue":"1","key":"1_CR15","first-page":"30","volume":"4","author":"P. Wang","year":"2010","unstructured":"Wang, P., Wu, L., Cunningham, R., Zou, C.C.: Honeypot detection in advanced botnet attacks. Int. J. Inf. Comput. Secur.\u00a04(1), 30\u201351 (2010)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: ACM SIGCOMM conference on Internet measurement (IMC), pp. 41\u201352 (2006)","DOI":"10.1145\/1177080.1177086"},{"key":"1_CR17","unstructured":"Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: First Workshop on Hot Topics in Understanding Botnets (HotBots). USENIX (2007)"},{"key":"1_CR18","first-page":"1","volume-title":"LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats","author":"T. Holz","year":"2008","unstructured":"Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1\u20139. USENIX Association, Berkeley (2008)"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-20757-0_1","volume-title":"NETWORKING 2011","author":"J. Fran\u00e7ois","year":"2011","unstructured":"Fran\u00e7ois, J., Wang, S., State, R., Engel, T.: BotTrack: Tracking Botnets using NetFlow and PageRank. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part I. LNCS, vol.\u00a06640, pp. 1\u201314. Springer, Heidelberg (2011)"},{"key":"1_CR20","unstructured":"Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: Bothunter: detecting malware infection through ids-driven dialog correlation. In: USENIX Security Symposium (SS) (August 2007)"}],"container-title":["Lecture Notes in Computer Science","Managing the Dynamics of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21484-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T03:42:02Z","timestamp":1553830922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21484-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214837","9783642214844"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21484-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}