{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:26:32Z","timestamp":1725686792163},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642306327"},{"type":"electronic","value":"9783642306334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30633-4_20","type":"book-chapter","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T03:25:28Z","timestamp":1338348328000},"page":"151-154","source":"Crossref","is-referenced-by-count":1,"title":["Large Scale DNS Analysis"],"prefix":"10.1007","author":[{"given":"Samuel","family":"Marchal","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","first-page":"18","volume-title":"Proceedings of the 19th USENIX Conference on Security","author":"M. Antonakakis","year":"2010","unstructured":"Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for dns. In: Proceedings of the 19th USENIX Conference on Security, pp. 18\u201318. USENIX Association, Berkeley (2010)"},{"key":"20_CR2","unstructured":"Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M.: Finding malicious domains using passive dns analysis. In: 18th Annual Network & Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, February 6-9 (2011)"},{"key":"20_CR3","unstructured":"Born, K., Gustafson, D.: Detecting dns tunnels using character frequency analysis. CoRR abs\/1004.4358 (2010)"},{"key":"20_CR4","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. In: Symposium on Opearting Systems Design & Implementation (OSDI). USENIX Association (2004)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Hartigan, J.A., Wong, M.A.: A k-means clustering algorithm. Applied Statistics\u00a028 (1979)","DOI":"10.2307\/2346830"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1582716.1582722","volume-title":"Proceedings of the 28th ACM Symposium on Principles of Distributed Computing, PODC 2009","author":"A. Lakshman","year":"2009","unstructured":"Lakshman, A., Malik, P.: Cassandra: structured storage system on a p2p network. In: Proceedings of the 28th ACM Symposium on Principles of Distributed Computing, PODC 2009, p. 5. ACM, New York (2009)"},{"key":"20_CR7","unstructured":"Lerner, R.M.: At the forge: Redis. Linux J. (September 2010), http:\/\/dl.acm.org\/citation.cfm?id=1883519.1883524"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Lin, J., Dyer, C.: Data-Intensive Text Processing with MapReduce (Synthesis Lectures on Human Language Technologies). Morgan and Claypool Publishers (2010)","DOI":"10.2200\/S00274ED1V01Y201006HLT007"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Marchal, S., Fran\u00e7ois, J., Wagner, C., State, R., Dulaunoy, A., Engel, T., Festor, O.: DNSSM: A large scale passive DNS security monitoring framework. In: NOMS 2012 (2012)","DOI":"10.1109\/NOMS.2012.6212019"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Rfc 1034: Domain names - concepts and facilities (1987)","DOI":"10.17487\/rfc1034"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Rfc 1035: Domain names - implementation and specification (1987)","DOI":"10.17487\/rfc1035"},{"key":"20_CR12","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1109\/ACSAC.2009.36","volume-title":"Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009","author":"R. Perdisci","year":"2009","unstructured":"Perdisci, R., Corona, I., Dagon, D., Lee, W.: Detecting malicious flux service networks through passive analysis of recursive dns traces. In: Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009, pp. 311\u2013320. IEEE Computer Society, Washington, DC (2009)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Plonka, D., Barford, P.: Context-aware clustering of dns query traffic. In: Internet Measurement Comference 2008, pp. 217\u2013230 (2008)","DOI":"10.1145\/1452520.1452547"},{"key":"20_CR14","unstructured":"Weimer, F.: Passive dns replication (2005)"},{"key":"20_CR15","unstructured":"White, T.: Hadoop: The Definitive Guide. O\u2019Reilly Media (June 2009)"}],"container-title":["Lecture Notes in Computer Science","Dependable Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30633-4_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:47:29Z","timestamp":1620128849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30633-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642306327","9783642306334"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30633-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}