{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:00:31Z","timestamp":1725742831614},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396922"},{"type":"electronic","value":"9783642396939"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39693-9_10","type":"book-chapter","created":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T01:42:27Z","timestamp":1375062147000},"page":"97-106","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Web Attacks Based on Domain Statistics"],"prefix":"10.1007","author":[{"given":"Chia-Mei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jhe-Jhun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ya-Hui","family":"Ou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"CENZIC, Web Application Security Trends Report, http:\/\/www.cenzic.com\/downloads\/Cenzic_AppSecTrends_Q3-Q4-2010"},{"key":"10_CR2","unstructured":"Netcraft, Web server Suvery (March 2012), http:\/\/news.netcraft.com\/"},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.eswa.2009.05.023","volume":"37","author":"Y.T. Hou","year":"2010","unstructured":"Hou, Y.T., Chang, Y., Chen, T., Laih, C.S., Chen, C.M.: Malicious Web Content Detection by Machine Learning. Expert Systems with Applications\u00a037(1), 55\u201360 (2010)","journal-title":"Expert Systems with Applications"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Ourston, D., Matzner, S., Stump, W., Hopkins, B.: Applications of Hidden Markov Models to Detecting Multi-stage Network Attacks. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (2003)","DOI":"10.1109\/HICSS.2003.1174909"},{"key":"10_CR5","unstructured":"Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In: 13th Annual Network and Distributed System Security Symposium (2006)"},{"key":"10_CR6","unstructured":"Yuan, B.: Client-side honeypots. Master\u2019s thesis. University of Mannheim (2007)"},{"key":"10_CR7","volume-title":"Capture - Honeypot Client (Capture-HPC)","author":"C. Seifert","year":"2006","unstructured":"Seifert, C., Steenson, R.: Capture - Honeypot Client (Capture-HPC). Victoria University of Wellington, NZ (2006)"},{"key":"10_CR8","unstructured":"Gruener, W.: Google: Anti-virus Software Needs to Share Up (2008), http:\/\/www.tomsguide.com\/us\/google-anti-virus,news-603.html"},{"key":"10_CR9","unstructured":"Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All Your iFRAMEs Point to Us. In: Proceedings of the 17th Conference on Security Symposium (2008)"},{"key":"10_CR10","unstructured":"Moshchuk, A., Bragin, T., Gribble, S.D., Levy, H.M.: A Crawler-based Study of Spyware on the Web. In: Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS), pp. 17\u201333 (2006)"},{"key":"10_CR11","unstructured":"Ikinci, A., Holz, T., Freiling, F.: Monkey-Spider:Detecting malicious websites with Low-Interaction Honeyclients. Master\u2019s thesis, University of Mannheim (2007)"},{"key":"10_CR12","unstructured":"Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The ghost in the browser analysis of web-based malware. In: Proceedings of the First Workshop on Hot Topics in Understanding Botnets, Cambridge (2007)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection, pp. 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Lin, S.F., Hou, Y.T., Chen, C.M., Jeng, B.C., Laih, C.S.: Malicious Webpage Detection by Semantics-Aware Reasoning. In: Proceedings of the International Conference on Intelligent Systems Design and Applications, pp. 115\u2013120 (2008)","DOI":"10.1109\/ISDA.2008.290"},{"key":"10_CR15","unstructured":"Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley (2002)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Seifert, C., Welch, I., Komisarczuk, P.: Identification of Malicious Web Pages Through Analysis of Underlying DNS and Web Server Relationships. In: 33rd Annual IEEE Conference on Local Computer Networks (2008)","DOI":"10.1109\/LCN.2008.4664306"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.cose.2010.10.001","volume":"30","author":"Z. Sadan","year":"2010","unstructured":"Sadan, Z., Schwartz, D.G.: WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposure. Computers & Security\u00a030(1), 4\u201312 (2010)","journal-title":"Computers & Security"},{"key":"10_CR18","unstructured":"Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a Dynamic Reputation System for DNS. In: Proc. USENIX Security Symposium (2010)"},{"key":"10_CR19","unstructured":"Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M.: EXPOSURE:Finding malicious domains using passive DNS analysis. In: Proc. Network and Distributed System Security Symposium, NDSS (2011)"},{"key":"10_CR20","unstructured":"SECURELIST, \u201cExploit Kits \u2013 A Different View\u201d, http:\/\/www.securelist.com\/en\/analysis\/204792160\/Exploit_Kits_A_Different_View"},{"key":"10_CR21","unstructured":"Cheng, Y.C.: Evolving Threat Landscapes Web-Based Botnet through Exploit Kits and Scripts Evolution. In: Workshop on Understanding Botnets of Taiwan (2011)"},{"key":"10_CR22","unstructured":"Real free websites, \u201cHow to choose a domain name\u201d, http:\/\/www.realfreewebsites.com\/articles\/how-to-choose-a-domain-name\/,2008"},{"key":"10_CR23","unstructured":"DominateSEO.net, \u201cBuy Deleted Domain to Give You New Business A Boost\u201d, http:\/\/dominateseo.net\/deleted-domains"},{"key":"10_CR24","unstructured":"http:\/\/mayoup555.xtgem.com\/Operator%20GSM\/Www.co.cc"},{"key":"10_CR25","unstructured":"http:\/\/smallbusiness.yahoo.com\/"},{"key":"10_CR26","unstructured":"http:\/\/www.godaddy.com\/domains\/get-a-website-Globe-2.aspx?isc=gtnftw01"},{"key":"10_CR27","unstructured":"IANA, \u201cInternet Assigned Numbers Authority\u201d, http:\/\/www.iana.org\/numbers"},{"key":"10_CR28","unstructured":"Huang, M.Z.: Hybrid Botnet Detection. Master thesis, National Sun Yat-Sen University (2008)"},{"key":"10_CR29","unstructured":"CLEAN MX, \u201cCLEAN MX realtime database\u201d, http:\/\/support.clean-mx.de\/clean-mx\/viruses"},{"key":"10_CR30","unstructured":"Malware Domain List, \u201cMalware Domain List\u201d, http:\/\/www.malwaredomainlist.com\/"},{"key":"10_CR31","unstructured":"Phishtank, \u201cPhishtank\u201d, http:\/\/www.phishtank.com\/"},{"key":"10_CR32","unstructured":"Alexa, \u201cAlexa the Web Information Company\u201d, http:\/\/www.alexa.com\/"},{"key":"10_CR33","unstructured":"Dmoz, \u201cOpen Directory Project\u201d, http:\/\/www.dmoz.org\/"},{"key":"10_CR34","unstructured":"McAfee, \u201cMaAfee SiteAdvisor\u201d, http:\/\/www.siteadvisor.com\/"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39693-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T23:07:20Z","timestamp":1596236840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39693-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396922","9783642396939"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39693-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}