{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:51:12Z","timestamp":1771699872576,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642319112","type":"print"},{"value":"9783642319129","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_9","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"127-139","source":"Crossref","is-referenced-by-count":7,"title":["Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition"],"prefix":"10.1007","author":[{"given":"Yong","family":"Qiao","sequence":"first","affiliation":[]},{"given":"Yuexiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"He","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yingzhi","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 268\u2013273. IEEE (2009)","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"9_CR2","unstructured":"Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B.H., Dagon, D.: Peer-to-peer botnets: Overview and case study. In: 1st USENIX Workshop on Hot Topics in Understanding Botnets, HostBots 2007 (2007)"},{"key":"9_CR3","unstructured":"Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: LEET 2008 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, p. 9. USENIX Association (2008)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Wang, P., Aslam, B., Zou, C.C.: Peer-to-Peer Botnets: The Next Generation of Botnet Attacks. Electrical Engineering, 1\u201325 (2010)","DOI":"10.1007\/978-3-642-04117-4_18"},{"key":"9_CR5","unstructured":"Wang, P., Sparks, S., Zou, C.C.: An advanced hybrid peer-to-peer botnet. In: Proceedings of the First Workshop on Hot Topics in Understanding Botnets, p. 2. USENIX Association (2007)"},{"key":"9_CR6","unstructured":"Vogt, R., Aycock, J., Jacobson, M.: Army of botnets. In: Proceedings of NDSS 2007, Citeseer, pp. 111\u2013123 (2007)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Starnberger, G., Kruegel, C., Kirda, E.: Overbot: a botnet protocol based on Kademlia. In: 4th Int. Conf. on Security and Privacy in Communication Networks (SecureComm 2008), pp. 1\u20139. ACM (2008)","DOI":"10.1145\/1460877.1460894"},{"key":"9_CR8","unstructured":"Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: Bothunter: Detecting malware infection through ids-driven dialog correlation. In: 16th USENIX Security Symp. (Security 2007), pp. 167\u2013182. USENIX Association (2007)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"807","DOI":"10.4304\/jnw.6.5.807-814","volume":"6","author":"J. Kang","year":"2011","unstructured":"Kang, J., Song, Y.-Z., Zhang, J.-Y.: Accurate detection of peer-to-peer botnet using Multi-Stream Fused scheme. Journal of Networks\u00a06, 807\u2013814 (2011)","journal-title":"Journal of Networks"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Villamarin-Salomon, R., Brustoloni, J.C.: Bayesian bot detection based on DNS traffic similarity. In: 24th Annual ACM Symposium on Applied Computing, pp. 2035\u20132041. Association for Computing Machinery (2009)","DOI":"10.1145\/1529282.1529734"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1504\/IJIPT.2010.032614","volume":"5","author":"Z. Huang","year":"2010","unstructured":"Huang, Z., Zeng, X., Liu, Y.: Detecting and blocking P2P botnets Through contact tracing chains. International Journal of Internet Protocol Technology\u00a05, 44\u201354 (2010)","journal-title":"International Journal of Internet Protocol Technology"},{"key":"9_CR12","unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol and structure independent botnet detection. In: 17th USENIX Security Symp., pp. 139\u2013154. USENIX Association (2008)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11555827_19","volume-title":"Computer Security \u2013 ESORICS 2005","author":"F.C. Freiling","year":"2005","unstructured":"Freiling, F.C., Holz, T., Wicherski, G.: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. In: de Capitani di Vimercati, S., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 319\u2013335. Springer, Heidelberg (2005)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1504\/IJICS.2010.031858","volume":"4","author":"P. Wang","year":"2010","unstructured":"Wang, P., Wu, L., Cunningham, R., Zou, C.C.: Honeypot detection in advanced botnet attacks. International Journal of Information and Computer Security\u00a04, 30\u201351 (2010)","journal-title":"International Journal of Information and Computer Security"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Lee, J.S., Jeong, H.C., Park, J.H., Kim, M., Noh, B.-N.: The activity analysis of malicious http-based botnets using degree of periodic repeatability. In: 2008 International Conference on Security Technology, pp. 83\u201386. Inst. of Elec. and Elec. Eng. Computer Society (2008)","DOI":"10.1109\/SecTech.2008.52"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"AsSadhan, B., Moura, J.M.F., Lapsley, D.: Periodic behavior in botnet command and control channels traffic. In: 2009 IEEE Global Telecommunications Conference. Institute of Electrical and Electronics Engineers Inc. (2009)","DOI":"10.1109\/GLOCOM.2009.5426172"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Ma, X., Guan, X., Tao, J., Zheng, Q., Guo, Y., Liu, L., Zhao, S.: A novel IRC botnet detection method based on packet size sequence. In: 2010 IEEE International Conference on Communications. Institute of Electrical and Electronics Engineers Inc. (2010)","DOI":"10.1109\/ICC.2010.5502092"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/s00530-003-0088-1","volume":"9","author":"S. Saroiu","year":"2003","unstructured":"Saroiu, S., Gummadi, K.P., Gribble, S.D.: Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multimedia Systems\u00a09, 170\u2013184 (2003)","journal-title":"Multimedia Systems"},{"key":"9_CR19","unstructured":"eMule 0.47 code, eMule project (2011), \n                    \n                      http:\/\/www.emule-project.net\/home\/perl\/general.cgi?l=42&rm=download"},{"key":"9_CR20","unstructured":"Kernel, H.: Emule Kad protocol Manual (2009), \n                    \n                      http:\/\/easymule.googlecode.com\/files\/Emule"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:51:01Z","timestamp":1620129061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}