{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:16:57Z","timestamp":1759133817444,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/ccst.2015.7389699","type":"proceedings-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T16:35:32Z","timestamp":1453739732000},"page":"293-298","source":"Crossref","is-referenced-by-count":6,"title":["Scalable command and control detection in log data through UF-ICF analysis"],"prefix":"10.1109","author":[{"given":"Kai-Fong","family":"Hong","sequence":"first","affiliation":[]},{"given":"Chien-Chih","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yu-Ting","family":"Chiu","sequence":"additional","affiliation":[]},{"given":"Kuo-Sen","family":"Chou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.138"},{"journal-title":"Cloud Security Alliance","article-title":"Big Data Analytics for Security Intelligence","year":"2013","key":"ref11"},{"key":"ref12","first-page":"93","article-title":"Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats","volume":"1","author":"giura","year":"2012","journal-title":"Science J"},{"article-title":"The User Agent Field: Analyzing and Detecting the Abnormal or Malicious in your Organization","year":"2011","author":"manners","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123125"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322100"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533062"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.86"},{"article-title":"Revealed: operation shady RAT","year":"2011","author":"alperovitch","key":"ref4"},{"article-title":"Advanced Persistent threats and how to monitor and deter them, Network Security","year":"2011","author":"tankard","key":"ref3"},{"key":"ref6","article-title":"BotMiner: Clustering analysis of network traffic for protocol-and structureindependent botnet detection","author":"gu","year":"2008","journal-title":"Usenix Security"},{"key":"ref5","article-title":"Botsniffer: Detecting botnet command and control channels in network traffic","author":"gu","year":"2008","journal-title":"NDSS"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35416-8_16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"journal-title":"Neutrino Bot","year":"0","key":"ref20"},{"key":"ref22","article-title":"Measuring and Detecting Fast-Flux Service Networks","author":"holz","year":"2008","journal-title":"NDSS"},{"key":"ref21","article-title":"As the net chums: Fast-flux botnet observations","author":"jose","year":"2008","journal-title":"MALWARE 2008 3rd International Conference on Malicious and Unwanted Software 2008"},{"key":"ref24","article-title":"Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces","author":"perdisci","year":"2010","journal-title":"NSDI"},{"key":"ref23","first-page":"186","article-title":"Fluxor: Detecting and monitoring fast-flux service networks","author":"emanuele","year":"2008","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"}],"event":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2015,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2015,9,24]]}},"container-title":["2015 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7369421\/7389647\/07389699.pdf?arnumber=7389699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:38:42Z","timestamp":1490395122000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7389699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ccst.2015.7389699","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}