{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:26:30Z","timestamp":1730222790019,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fskd.2017.8393235","type":"proceedings-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T18:38:33Z","timestamp":1531766313000},"page":"2860-2865","source":"Crossref","is-referenced-by-count":2,"title":["Using Botnet structure to construct the communication system of a real-time monitoring platform: Botnet structure for real-time monitoring platform"],"prefix":"10.1109","author":[{"given":"Han-Wei","family":"Hsiao","sequence":"first","affiliation":[]},{"given":"Shih-Heng","family":"Tung","sequence":"additional","affiliation":[]},{"given":"Ming-Hsiang","family":"Shih","sequence":"additional","affiliation":[]},{"given":"Wen-Pei","family":"Sung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.205"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2010.031858"},{"key":"ref12","first-page":"43","article-title":"An Algorithm for Anomaly-based Botnet Detection","volume":"2","author":"binkley","year":"2006","journal-title":"Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2007.90"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_1"},{"key":"ref15","first-page":"139","article-title":"BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection","author":"gu","year":"2008","journal-title":"Proceedings of The 17th Conference on Security Symposium"},{"key":"ref16","article-title":"Bots & Botnet: An Overview","author":"puri","year":"2003","journal-title":"SANS Institute"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"ref18","first-page":"39","article-title":"The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets","author":"cooke","year":"2005","journal-title":"Proceedings of the steps to reducing unwanted traffic on the internet on steps to reducing unwanted traffic on the internet workshop"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1459"},{"key":"ref4","article-title":"Symantec Global Internet Security Threat Report trends for 2009","author":"fossi","year":"2010","journal-title":"Symantec Cloud Message Labs Tech Rep"},{"journal-title":"Symantec Cloud Message Labs Tech Rep","article-title":"Symantec Intelligence Report: June 2011","year":"2012","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/j.cose.2006.12.002","article-title":"Functional Similarities Between Computer Worms and Biological Pathogens","volume":"26","author":"li","year":"2007","journal-title":"Computers & Security"},{"key":"ref5","article-title":"Botnet Detection by Abnormal IRC Traffic Analysis","author":"lai","year":"2009","journal-title":"The Fourth Joint Workshop on Information Security"},{"key":"ref8","article-title":"McAfee Threats Report: Second Quarter 2011","author":"dirro","year":"2011","journal-title":"McAfee Labs Tech Rep"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068854"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.40"},{"journal-title":"The Coreflood Report","year":"2008","author":"stewart","key":"ref9"},{"journal-title":"Internet World Stats","year":"2010","key":"ref1"},{"journal-title":"MA USA Addison-Wesley Longman Publishing Co Inc","year":"2002","author":"spitzner","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"ref24","article-title":"BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic","author":"gu","year":"2008","journal-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)"},{"key":"ref23","article-title":"Wide-scale Botnet Detection and Characterization","author":"karasaridis","year":"2007","journal-title":"Proceedings of the First Workshop on Hot Topics in Understanding Botnets"},{"key":"ref25","article-title":"Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation","author":"goebel","year":"2007","journal-title":"First workshop on Hot Topics in Understanding Botnets (HotBots 07)"}],"event":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","start":{"date-parts":[[2017,7,29]]},"location":"Guilin","end":{"date-parts":[[2017,7,31]]}},"container-title":["2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8384043\/8392854\/08393235.pdf?arnumber=8393235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T20:14:46Z","timestamp":1598213686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8393235\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/fskd.2017.8393235","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}