{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:51:05Z","timestamp":1730209865435,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/comsnets.2013.6465572","type":"proceedings-article","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T13:29:54Z","timestamp":1362144594000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["Privacy-preserving domain-flux botnet detection in a large scale network"],"prefix":"10.1109","author":[{"given":"Hachem","family":"Guerid","sequence":"first","affiliation":[]},{"given":"Karel","family":"Mittig","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Serhrouchni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"journal-title":"Alexa Top Sites","year":"0","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762763"},{"key":"18","first-page":"24","article-title":"From throw-away traffic to bots: Detecting the rise of dga-based malware","author":"antonakakis","year":"2012","journal-title":"Proceedings of the 12th conference on USENIX Security Symposium"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31909-9_26"},{"key":"13","article-title":"Building a dynamic reputation system for dns","author":"antonakakis","year":"2010","journal-title":"Proceedings of the 19th USENIX Conference on Security"},{"key":"14","first-page":"27","article-title":"Detecting malware domains at the upper dns hierarchy","volume":"11","author":"antonakakis","year":"2011","journal-title":"Proc Usenix Security Symposium"},{"journal-title":"Analysis of the Kraken Botnet","year":"2008","author":"royal","key":"11"},{"journal-title":"Zeus Gets More Sophisticated Using p2p Techniques","year":"2011","key":"12"},{"journal-title":"List of Top-level Domains","year":"0","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690854"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0882"},{"journal-title":"Botnet Communication Topologies","year":"2009","author":"ollmann","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70005-2"},{"key":"7","article-title":"The impact of passive dns collection on end-user privacy","author":"spring","year":"2012","journal-title":"Securing and Trusting Internet Names"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2007.90"},{"key":"5","article-title":"Exposure: Finding malicious domains using passive dns analysis","author":"bilge","year":"2011","journal-title":"Proceedings of NDSS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"journal-title":"Know Your Enemy Containing Conficker","year":"2009","author":"leder","key":"9"},{"key":"8","article-title":"On the effects of registrarlevel intervention","author":"liu","year":"2011","journal-title":"Proc 1st USENIX LEET"}],"event":{"name":"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2013,1,7]]},"location":"Bangalore, India","end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6451320\/6465521\/06465572.pdf?arnumber=6465572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:22:31Z","timestamp":1490203351000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6465572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2013.6465572","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}