{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:15:50Z","timestamp":1771330550734,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642241772","type":"print"},{"value":"9783642241789","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24178-9_21","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T14:49:45Z","timestamp":1315406985000},"page":"299-313","source":"Crossref","is-referenced-by-count":48,"title":["Stegobot: A Covert Social Network Botnet"],"prefix":"10.1007","author":[{"given":"Shishir","family":"Nagaraja","sequence":"first","affiliation":[]},{"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[]},{"given":"Pratch","family":"Piyawongwisal","sequence":"additional","affiliation":[]},{"given":"Vijit","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Pragya","family":"Agarwal","sequence":"additional","affiliation":[]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Facebook, http:\/\/www.facebook.com"},{"key":"21_CR2","unstructured":"Flickr, http:\/\/www.flickr.com"},{"key":"21_CR3","unstructured":"JSteg, http:\/\/zooid.org\/~paul\/crypto\/jsteg\/"},{"key":"21_CR4","unstructured":"Koobface, http:\/\/en.wikipedia.org\/wiki\/Koobface"},{"issue":"6794","key":"21_CR5","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R. Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barabasi, A.-L.: Error and attack tolerance of complex networks. Nature\u00a0406(6794), 378\u2013382 (2000)","journal-title":"Nature"},{"key":"21_CR6","first-page":"7","volume-title":"SRUTI 2006: Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet","author":"J.R. Binkley","year":"2006","unstructured":"Binkley, J.R., Singh, S.: An algorithm for anomaly-based botnet detection. In: SRUTI 2006: Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet, p. 7. USENIX Association, Berkeley (2006)"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s00530-005-0194-3","volume":"11","author":"J.J. Fridrich","year":"2005","unstructured":"Fridrich, J.J., Goljan, M., Soukal, D.: Perturbed quantization steganography. Multimedia Syst.\u00a011(2), 98\u2013107 (2005)","journal-title":"Multimedia Syst."},{"key":"21_CR8","first-page":"3","volume-title":"Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007","author":"J.J. Fridrich","year":"2007","unstructured":"Fridrich, J.J., Pevn\u00fd, T., Kodovsk\u00fd, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Kundur, D., Prabhakaran, B., Dittmann, J., Fridrich, J.J. (eds.) Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, pp. 3\u201314. ACM, New York (2007)"},{"key":"21_CR9","unstructured":"Goebel, J., Holz, T.: Rishi: Identify bot contaminated hosts by IRC nickname evaluation. In: HotBots (2007)"},{"key":"21_CR10","unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th USENIX Security Symposium, Security 2008 (2008)"},{"key":"21_CR11","unstructured":"Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: HotBots (2007)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-74124-4_21","volume-title":"Information Hiding","author":"Y. Kim","year":"2007","unstructured":"Kim, Y., Duric, Z., Richards, D.: Modified Matrix Encoding Technique for Minimal Distortion Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 314\u2013327. Springer, Heidelberg (2007)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-540-70585-7","volume-title":"Information Hiding","author":"K. Lee","year":"2008","unstructured":"Lee, K., Westfeld, A.: Generalised category attack\u2014improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 11\u201313. Springer, Heidelberg (2008)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11922841_4","volume-title":"Digital Watermarking","author":"K. Lee","year":"2006","unstructured":"Lee, K., Westfeld, A., Lee, S.: Category attack for lsb embedding of jpeg images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 35\u201348. Springer, Heidelberg (2006)"},{"key":"21_CR15","unstructured":"Nagaraja, S., Anderson, R.: The snooping dragon: social-malware surveillance of the tibetan movement. Technical Report UCAM-CL-TR-746, University of Cambridge (March 2009)"},{"key":"21_CR16","first-page":"7","volume-title":"Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010","author":"S. Nagaraja","year":"2010","unstructured":"Nagaraja, S., Mittal, P., Hong, C.-Y., Caesar, M., Borisov, N.: Botgrep: finding p2p bots with structured graph analysis. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 7. USENIX Association, Berkeley (2010)"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-14215-4_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A. Nappa","year":"2010","unstructured":"Nappa, A., Fattori, A., Balduzzi, M., Dell\u2019Amico, M., Cavallaro, L.: Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol.\u00a06201, pp. 81\u2013100. Springer, Heidelberg (2010)"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-36415-3_17","volume-title":"Information Hiding","author":"Newman","year":"2003","unstructured":"Newman, Moskowitz, Chang, Brahmadesam: A steganographic embedding undetectable by JPEG compatibility steganalysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 258\u2013277. Springer, Heidelberg (2003)"},{"key":"21_CR19","unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: A multi-perspective analysis of the Storm (Peacomm) worm. In: SRI Technical Report 10-01 (2007)"},{"key":"21_CR20","unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: A foray into Conficker\u2019s logic and rendezvous points. In: 2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET 2009 (2009)"},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security and Privacy\u00a01, 32\u201344 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P. Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 154\u2013167. Springer, Heidelberg (2004)"},{"key":"21_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-77370-2_2","volume-title":"Information Hiding","author":"K. Solanki","year":"2008","unstructured":"Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In: Furon, T., Cayre, F., Do\u00ebrr, G.J., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 16\u201331. Springer, Heidelberg (2008)"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Solanki, K., Sullivan, K., Madhow, U., Manjunath, B., Chandrasekaran, S.: Provably secure steganography: Achieving zero k-l divergence using statistical restoration. In: ICIP (2006)","DOI":"10.1109\/ICIP.2006.312388"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Stover, S., Dittrich, D., Hernandez, J., Dietrich, S.: Analysis of the Storm and Nugache trojans: P2P is here. Login\u00a032(6) (December 2007)","DOI":"10.1016\/S0262-4079(07)61440-7"},{"key":"21_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A. Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2013A steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 289\u2013302. Springer, Heidelberg (2001)"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 61\u201375. Springer, Heidelberg (2000)","DOI":"10.1007\/10719724_5"},{"key":"21_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-70542-0_11","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"T.-F. Yen","year":"2008","unstructured":"Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.\u00a05137, pp. 207\u2013227. Springer, Heidelberg (2008)"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in jsteg-like steganography. In: International Conference on Pattern Recognition, vol.\u00a04, pp. 673\u2013676 (2004)","DOI":"10.1109\/ICPR.2004.1333862"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24178-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T23:25:42Z","timestamp":1741562742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24178-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642241772","9783642241789"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24178-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}