{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T06:03:29Z","timestamp":1750831409917,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642224232"},{"type":"electronic","value":"9783642224249"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22424-9_10","type":"book-chapter","created":{"date-parts":[[2011,6,20]],"date-time":"2011-06-20T02:37:35Z","timestamp":1308537455000},"page":"164-183","source":"Crossref","is-referenced-by-count":28,"title":["What\u2019s Clicking What? Techniques and Innovations of Today\u2019s Clickbots"],"prefix":"10.1007","author":[{"given":"Brad","family":"Miller","sequence":"first","affiliation":[]},{"given":"Paul","family":"Pearce","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Grier","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kreibich","sequence":"additional","affiliation":[]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Abu Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: A Multifaceted Approach to Understanding the Botnet Phenomenon. In: Proc. of SIGCOMM (2006)","DOI":"10.1145\/1177080.1177086"},{"key":"10_CR2","unstructured":"Bodmer, S., Vandegrift, M.: Looking Back at Murofet, a ZeuSbot Variants Active History (November 2010) \n                    \n                      http:\/\/blog.damballa.com\/?p=1008"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Buehrer, G., Stokes, J.W., Chellapilla, K.: A Large-scale Study of Automated Web Search Traffic. In: Proc. of Workshop on Adversarial Information Retrieval on the Web (2008)","DOI":"10.1145\/1451983.1451985"},{"key":"10_CR4","unstructured":"Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring Pay-per-Install: The Commoditization of Malware Distribution. In: Proc. of the USENIX Security (2011)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Caballero, J., Poosankam, P., Kreibich, C., Song, D.: Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering. In: Proc. of ACM CCS (2009)","DOI":"10.1145\/1653662.1653737"},{"key":"10_CR6","unstructured":"Chiang, K., Lloyd, L.: A Case Study of the Rustock Rootkit and Spam Bot. In: Proc. of the 1st Workshop on Hot Topics in Understanding Botnets, USENIX Association (2007)"},{"key":"10_CR7","unstructured":"Cho, C.Y., Caballero, J., Grier, C., Paxson, V., Song, D.: Insights from the Inside: A View of Botnet Management from Infiltration. In: Proc. of LEET (2010)"},{"key":"10_CR8","unstructured":"Click Fraud Rate Rises to 22.3 Percent in Q3 2010 (October 2010), \n                    \n                      http:\/\/www.clickforensics.com\/newsroom\/press-releases\/170-click-fraud-rate-rises-to-223-percent-in-q3-2010.html"},{"key":"10_CR9","unstructured":"Daswani, N., Stoppelman, M.: The Anatomy of Clickbot.A. In: Proc. of the Workshop on Hot Topics in Understanding Botnets (2007)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of USENIX Security (2004)","DOI":"10.21236\/ADA465464"},{"key":"10_CR11","unstructured":"Gummadi, R., Balakrishnan, H., Maniatis, P., Ratnasamy, S.: Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. In: Proc. of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 307\u2013320 (2009)"},{"key":"10_CR12","unstructured":"Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In: Proc. of the LEET (2008)"},{"key":"10_CR13","unstructured":"John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying Spamming Botnets Using Botlab. In: Proc. of the USENIX NSDI (2009)"},{"key":"10_CR14","unstructured":"Juels, A., Stamm, S., Jakobsson, M.: Combating Click Fraud Via Premium Clicks. In: Proc. of the USENIX Security (2007)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Kang, H., Wang, K., Soukal, D., Behr, F., Zheng, Z.: Large-scale Bot Detection for Search Engines. In: Proc. of WWW (2010)","DOI":"10.1145\/1772690.1772742"},{"key":"10_CR16","unstructured":"Kintana, C., Turner, D., Pan, J.Y., Metwally, A., Daswani, N., Chin, E., Bortz, A.: The Goals and Challenges of Click Fraud Penetration Testing Systems. In: Proc. of the Intl. Symposium on Software Reliability Engineering (2009)"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/354871.354874","volume":"18","author":"E. Kohler","year":"2000","unstructured":"Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, M.F.: The Click Modular Router. ACM Transactions Computer Systems\u00a018, 263\u2013297 (2000), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/354871.354874","journal-title":"ACM Transactions Computer Systems"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MSP.2010.88","volume":"8","author":"N. Kshetri","year":"2010","unstructured":"Kshetri, N.: The Economics of Click Fraud. IEEE Security Privacy\u00a08, 45\u201353 (2010)","journal-title":"IEEE Security Privacy"},{"key":"10_CR19","unstructured":"Polychronakis, M., Mavrommatis, P., Provos, N.: Ghost turns Zombie: Exploring the Life Cycle of Web-based Malware. In: Proc. of LEET (2008)"},{"key":"10_CR20","unstructured":"Tuzhilin, A.: The Lane\u2019s Gift vs. Google Report (2006) ,\n                    \n                      http:\/\/googleblog.blogspot.com\/pdf\/Tuzhilin_Report.pdf"},{"key":"10_CR21","unstructured":"The Underground Economy of the Pay-Per-Install (PPI) Business (September 2009), \n                    \n                      http:\/\/www.secureworks.com\/research\/threats\/ppi"},{"key":"10_CR22","unstructured":"Villeneuve, N.: Koobface: Inside a Crimeware Network (November 2010), \n                    \n                      http:\/\/www.infowar-monitor.net\/reports\/iwm-koobface.pdf"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Yu, F., Xie, Y., Ke, Q.: SBotMiner: Large Scale Search Bot Detection. In: Proc. of the Intl. Conference on Web Search and Data Mining (2010)","DOI":"10.1145\/1718487.1718540"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22424-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T01:54:13Z","timestamp":1553824453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22424-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642224232","9783642224249"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22424-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}