{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:05Z","timestamp":1763468285467,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346816","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"95-103","source":"Crossref","is-referenced-by-count":10,"title":["Disrupting stealthy botnets through strategic placement of detectors"],"prefix":"10.1109","author":[{"given":"Sridhar","family":"Venkatesan","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","journal-title":"Interpol coordinates global operation to take down simda botnet","article-title":"Interpol","key":"ref10"},{"year":"2013","author":"moura","journal-title":"Internet bad neighborhoods U'Tpublications","key":"ref11"},{"key":"ref12","first-page":"95","article-title":"Botgrep: Finding P2P bots with structured graph analysis","author":"nagaraj","year":"2010","journal-title":"Proceedings of the 19th USENIX Security Symposium"},{"key":"ref13","first-page":"1","article-title":"Case study of the miner botnet","author":"ohmann","year":"2012","journal-title":"Cyber Conflict (CYCON) 2012 4th International Conference on"},{"year":"2008","author":"salusky","journal-title":"Know Your Enemy Fast-Flux Service Networks","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/DSN.2015.40"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.comnet.2012.07.021"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MALWARE.2009.5403015"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-319-14039-1_3"},{"key":"ref19","article-title":"The ZeroAccess botnet: Mining and fraud for massive financial gain","author":"wyke","year":"2012","journal-title":"Sophos Tech Rep"},{"key":"ref4","article-title":"A new iteration of the TDSS\/TDL4 malware using DGA-based command-and-control","author":"damballa","year":"2012","journal-title":"Technical report Damballa"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ACSAC.2007.44"},{"key":"ref6","first-page":"139","article-title":"BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"ref5","article-title":"Sality: Story of a peer-to-peer viral network","author":"falliere","year":"2011","journal-title":"Technical report Symantec Labs"},{"key":"ref8","article-title":"BotSniffer: Detecting botnet command and control channels in network traffic","author":"gu","year":"2008","journal-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008)"},{"key":"ref7","first-page":"1","article-title":"BotHunter: Detecting malware infection through IDS-driven dialog correlation","volume":"7","author":"gu","year":"2007","journal-title":"Proceedings of the 16th USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1298306.1298319"},{"key":"ref1","article-title":"Challenges in experimenting with botnet detection systems","author":"aviv","year":"2011","journal-title":"4th Workshop on Cyber Security Experimentation and Test (CSET"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/DSN.2009.5270322"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346816.pdf?arnumber=7346816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:16:19Z","timestamp":1602684979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7346816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346816","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}