{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:10:03Z","timestamp":1745968203919,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371912"},{"type":"electronic","value":"9783642371929"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37192-9_53","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T02:05:39Z","timestamp":1362449139000},"page":"529-539","source":"Crossref","is-referenced-by-count":6,"title":["Malicious Automatically Generated Domain Name Detection Using Stateful-SBB"],"prefix":"10.1007","author":[{"given":"Fariba","family":"Haddadi","sequence":"first","affiliation":[]},{"given":"H. Gunes","family":"Kayacik","sequence":"additional","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","doi-asserted-by":"crossref","unstructured":"Feily, M., Shahrestani, A.: A Survey of Botnet and Botnet Detection. Emerging Security Information. In: Emerging Security, Systems and Technologies (2009)","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"53_CR2","unstructured":"Damballa Inc.:Top 10 Botnet Threats (2010), http:\/\/www.damballa.com"},{"key":"53_CR3","unstructured":"McAfee Labs Thread Reports, http:\/\/www.mcafee.com\/apps\/view-all\/publications.aspx"},{"key":"53_CR4","doi-asserted-by":"crossref","unstructured":"Doucette, J., McIntyre, A.R., Lichodzijewski, P., Heywood, M.I.: Symbiotic Coev-olutionary Genetic Programming: A Benchmarking Study Under Large Attribute Spaces. Genetic Programming and Evolvable Machines\u00a013(1), 71\u2013101 (2012)","DOI":"10.1007\/s10710-011-9151-4"},{"key":"53_CR5","unstructured":"Vuong, S.T., Alam, M.S.: Advanced Methods for Botnet Intrusion Detection Systems. In: Intrusion Detection Systems. InTech. (2011)"},{"key":"53_CR6","doi-asserted-by":"crossref","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Xu, Y., Karir, M.: A Survey of Botnet Technology and Defense. In: CATCH (2009)","DOI":"10.1109\/CATCH.2009.40"},{"key":"53_CR7","unstructured":"The Role of DNS in Botnet Command & Control. In: Open DNS Inc., Whitepaper (2012)"},{"key":"53_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, L., Yu, S., Wu, D., Watters, P.: A Survey on Latest Botnet Attack and Defence. In: TrustCom, pp. 53\u201360 (2001)","DOI":"10.1109\/TrustCom.2011.11"},{"key":"53_CR9","doi-asserted-by":"crossref","unstructured":"Stalmans, E., Irwin, B.: A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network. In: Information Security South Africa (2011)","DOI":"10.1109\/ISSA.2011.6027531"},{"key":"53_CR10","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TNET.2012.2184552","volume":"20","author":"S. Yadav","year":"2012","unstructured":"Yadav, S., Reddy, A.K.K., Reddy, A.L.N., Ranjan, S.: Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis. IEEE\/ACM Transaction on Networking\u00a020, 1663\u20131977 (2012)","journal-title":"IEEE\/ACM Transaction on Networking"},{"key":"53_CR11","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.: Beyond blacklists: Learning to detect malicious Web sites from suspicious URLs. In: ACM KDD (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"53_CR12","unstructured":"Antonakakakis, M., Perdisci, R., Dagon, D.: Building a Dynamic Reputation System for DNS. In: USENIX Security (2010)"},{"key":"53_CR13","unstructured":"Alpaydin, E.: Introduction to Machine Learning. MIT Press (2004)"},{"key":"53_CR14","unstructured":"Abuse: AMaDA, https:\/\/palevotracker.abuse.ch\/"},{"key":"53_CR15","unstructured":"Abuse: Zeus Tracker, https:\/\/zeustracker.abuse.ch\/"},{"key":"53_CR16","unstructured":"Alexa, http:\/\/www.alexa.com\/topsites"},{"key":"53_CR17","unstructured":"Top Level Domain Names, http:\/\/mxr.mozilla.org\/mozilla-central\/source\/netwerk\/dns\/effective_tld_names.dat?raw=1"},{"key":"53_CR18","unstructured":"WEKA, http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"53_CR19","doi-asserted-by":"crossref","unstructured":"Lichodzikewski, P., Heywood, M.I.: Symbiosis Complexification and Simplicity under GP. In: GECCO (2010)","DOI":"10.1145\/1830483.1830640"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37192-9_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:56:29Z","timestamp":1745967389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37192-9_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371912","9783642371929"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37192-9_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}