{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:02Z","timestamp":1763468102126},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642365157"},{"type":"electronic","value":"9783642365164"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36516-4_22","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T13:11:01Z","timestamp":1363180261000},"page":"218-228","source":"Crossref","is-referenced-by-count":5,"title":["Characterization of Blacklists and Tainted Network Traffic"],"prefix":"10.1007","author":[{"given":"Jing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ari","family":"Chivukula","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Bailey","sequence":"additional","affiliation":[]},{"given":"Manish","family":"Karir","sequence":"additional","affiliation":[]},{"given":"Mingyan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Akamai, \n                    \n                      http:\/\/www.akamai.com\/","key":"22_CR1"},{"unstructured":"Barracuda reputation blocklist, \n                    \n                      http:\/\/www.barracudacentral.org\/","key":"22_CR2"},{"unstructured":"Cbl: Composite blocking list, \n                    \n                      http:\/\/cbl.abuseat.org\/","key":"22_CR3"},{"unstructured":"Dshield, \n                    \n                      http:\/\/www.dshield.org\/","key":"22_CR4"},{"unstructured":"HpHosts for your pretection, \n                    \n                      http:\/\/hosts-file.net\/","key":"22_CR5"},{"unstructured":"Internet has a garbage problem, researcher says, \n                    \n                      http:\/\/www.pcworld.com\/article\/144006\/article.html","key":"22_CR6"},{"unstructured":"Introduction to Cisco IOS NetFlow, \n                    \n                      http:\/\/www.cisco.com\/en\/US\/products\/ps6601\/prod_white_papers_list.html","key":"22_CR7"},{"unstructured":"Merit Network INC, \n                    \n                      http:\/\/www.merit.edu\/","key":"22_CR8"},{"unstructured":"Phishtank, \n                    \n                      http:\/\/www.phishtank.com\/","key":"22_CR9"},{"unstructured":"PREDICT: Protected Repository for the Defense of Infrastructure Against Cyber Threats, \n                    \n                      https:\/\/www.predict.org\/","key":"22_CR10"},{"unstructured":"SURBL: URL Reputation Data, \n                    \n                      http:\/\/www.surbl.org\/","key":"22_CR11"},{"unstructured":"Uceprotector network, \n                    \n                      http:\/\/www.uceprotect.net\/","key":"22_CR12"},{"unstructured":"Wpbl: Weighted private block list, \n                    \n                      http:\/\/www.wpbl.info\/","key":"22_CR13"},{"unstructured":"Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a Dynamic Reputation System for DNS. In: USENIX Security Symposium, pp. 273\u2013290 (2010)","key":"22_CR14"},{"doi-asserted-by":"crossref","unstructured":"Esquivel, H., Akella, A., Mori, T.: On the effectiveness of IP reputation for spam filtering. In: Proceedings of COMSNETS 2010, pp. 1\u201310 (2010)","key":"22_CR15","DOI":"10.1109\/COMSNETS.2010.5431981"},{"unstructured":"Cisco\u00a0Systems Inc. SpamCop Blocking List (SCBL), \n                    \n                      http:\/\/www.spamcop.net\/","key":"22_CR16"},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1145\/1028788.1028838","volume-title":"Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement","author":"J. Jung","year":"2004","unstructured":"Jung, J., Sit, E.: An empirical study of spam traffic and the use of DNS black lists. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 370\u2013375. ACM, New York (2004)"},{"unstructured":"Creyts, K., Karir, M., Mentley, N.: Towards network reputation - analyzing the makeup of rbls (June 2011)","key":"22_CR18"},{"doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: Proceedings of SIGCOMM 2006, pp. 291\u2013302 (2006)","key":"22_CR19","DOI":"10.1145\/1159913.1159947"},{"doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N., Vempala, S.: Filtering spam with behavioral blacklisting. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)","key":"22_CR20","DOI":"10.1145\/1315245.1315288"},{"unstructured":"Team Cymru\u00a0Community Services. IP to ASN Mapping, \n                    \n                      http:\/\/www.team-cymru.org\/Services\/ip-to-asn.html","key":"22_CR21"},{"issue":"1","key":"22_CR22","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TNET.2011.2157699","volume":"20","author":"C.A. Shue","year":"2012","unstructured":"Shue, C.A., Kalafut, A.J., Gupta, M.: Abnormally malicious autonomous systems and their internet connectivity. IEEE\/ACM Trans. Netw.\u00a020(1), 220\u2013230 (2012)","journal-title":"IEEE\/ACM Trans. Netw."},{"doi-asserted-by":"crossref","unstructured":"Sinha, S., Bailey, M., Jahanian, F.: Shades of Grey: On the Effectiveness of Reputation-based \u201dblacklists\u201d. In: Proceedings of MALWARE 2008, pp. 57\u201364 (October 2008)","key":"22_CR23","DOI":"10.1109\/MALWARE.2008.4690858"},{"unstructured":"Venkataraman, S., Sen, S., Spatscheck, O., Haffner, P., Song, D.: Exploiting network structure for proactive spam mitigation. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium. USENIX Association (2007)","key":"22_CR24"},{"doi-asserted-by":"crossref","unstructured":"Xie, Y., Yu, F., Achan, K., Gillum, E., Goldszmidt, M., Wobber, T.: How dynamic are ip addresses? In: Proceedings of SIGCOMM 2007, pp. 301\u2013312 (2007)","key":"22_CR25","DOI":"10.1145\/1282380.1282415"},{"unstructured":"Zhang, J., Porras, P., Ullrich, J.: Highly Predictive Blacklisting. In: Usenix Security (August 2008)","key":"22_CR26"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36516-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:47:47Z","timestamp":1558316867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36516-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642365157","9783642365164"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36516-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}