{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:41Z","timestamp":1746159341046,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_30","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"334-345","source":"Crossref","is-referenced-by-count":7,"title":["Improved Detection of P2P Botnets through Network Behavior Analysis"],"prefix":"10.1007","author":[{"given":"Shree","family":"Garg","sequence":"first","affiliation":[]},{"given":"Anil K.","family":"Sarje","sequence":"additional","affiliation":[]},{"given":"Sateesh Kumar","family":"Peddoju","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Chen, L., Richard, R.B.: Timing analysis in P2P botnet traffic using probabilistic context-free grammars. In: CSIIRW 2013. ACM, Oak Ridge (2013)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Saad, S., Traore, I., Ghorbani, A., Sayed, B., Zhao, D., Wei, L., Felix, J., Hakimian, P.: Detecting P2P botnets through network behavior analysis and machine learning. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST), pp. 174\u2013180 (2012)","DOI":"10.1109\/PST.2011.5971980"},{"key":"30_CR3","volume-title":"Principles of Data Mining","author":"D. Hand","year":"2001","unstructured":"Hand, D., Mannila, H., Smyth, P.: Principles of Data Mining. MIT Press, Cambridge (2001)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Livadas, C., Walsh, R., Lapsley, D., Strayer, W.T.: Usilng Machine Learning Technliques to Identify Botnet Traffic. In: Proceedings 2006 31st IEEE Conference on Local Computer Networks, pp. 967\u2013974 (2006)","DOI":"10.1109\/LCN.2006.322210"},{"key":"30_CR5","unstructured":"Guofei, G., Roberto, P., Junjie, Z., Wenke, L.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th Conference on Security Symposium. USENIX Association, San Jose (2008)"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-642-23496-5_17","volume-title":"Autonomic and Trusted Computing","author":"G. Fedynyshyn","year":"2011","unstructured":"Fedynyshyn, G., Chuah, M.C., Tan, G.: Detection and classification of different botnet C&C channels. In: Calero, J.M.A., Yang, L.T., M\u00e1rmol, F.G., Garc\u00eda Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol.\u00a06906, pp. 228\u2013242. Springer, Heidelberg (2011)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Junjie, Z., Perdisci, R., Wenke, L., Sarfraz, U., Xiapu, L.: Detecting stealthy P2P botnets using statistical traffic fingerprints. In: 2011 IEEE\/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp. 121\u2013132 (2011)","DOI":"10.1109\/DSN.2011.5958212"},{"key":"30_CR8","unstructured":"Alaidaros, H., Mahmuddin, M., Mazari, A.A.: An Overview of Flow-based and Packet-based Intrusion Detection Performance in High Speed Networks. In: Proceedings of the International Arab Conference on Information Technology (2011)"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-20757-0_1","volume-title":"NETWORKING 2011","author":"J. Fran\u00e7ois","year":"2011","unstructured":"Fran\u00e7ois, J., Wang, S., State, R., Engel, T.: BotTrack: Tracking Botnets Using NetFlow and PageRank. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part I. LNCS, vol.\u00a06640, pp. 1\u201314. Springer, Heidelberg (2011)"},{"issue":"4","key":"30_CR10","first-page":"645","volume":"7","author":"Shu-Chiung Lin","year":"2012","unstructured":"Lin, S.-C., Chen, P., Chang, C.-C.: A novel method of mining network flow to detect P2P botnets. In: Peer-to-Peer Networking and Applications, pp. 1\u201310 (2012)","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"30_CR11","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.comnet.2012.06.019","volume":"57","author":"C.J. Dietrich","year":"2013","unstructured":"Dietrich, C.J., Rossow, C., Pohlmann, N.: CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis. Comput. Netw.\u00a057, 475\u2013486 (2013)","journal-title":"Comput. Netw."},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.comnet.2012.07.018","volume":"57","author":"C.-Y. Huang","year":"2013","unstructured":"Huang, C.-Y.: Effective bot host detection based on network failure models. Computer Networks\u00a057, 514\u2013525 (2013)","journal-title":"Computer Networks"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Garg, S., Singh, A.K., Sarje, A.K., Peddoju, S.K.: Behaviour Analysis of Machine Learning Algorithms for detecting P2P Botnets. In: International Conference on Advanced Computing Technologies (2013)","DOI":"10.1109\/ICACT.2013.6710523"},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random Forests. Machine Learning\u00a045, 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"30_CR15","volume-title":"Using Random Forest to Learn Imbalanced Data","author":"C. Chao","year":"2004","unstructured":"Chao, C., Andy, L., Leo, B.: Using Random Forest to Learn Imbalanced Data. University of California, Berkeley (2004)"},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TSMCC.2011.2161285","volume":"42","author":"M. Galar","year":"2012","unstructured":"Galar, M., Ferna, X., Ndez, A., Barrenechea, E., Bustince, H., Herrera, F.: A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a042, 463\u2013484 (2012)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Barthakur, P., Dahal, M., Ghose, M.K.: A Framework for P2P Botnet Detection Using SVM. In: Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 195\u2013200 (2012)","DOI":"10.1109\/CyberC.2012.40"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:50Z","timestamp":1746130670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}