{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:00:36Z","timestamp":1730232036767,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5198970","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T16:20:30Z","timestamp":1250007630000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Detection of Bots in Subscribers' Computers"],"prefix":"10.1109","author":[{"given":"J.","family":"Brustoloni","sequence":"first","affiliation":[]},{"given":"N.","family":"Farnan","sequence":"additional","affiliation":[]},{"given":"R.","family":"Villamarin-Salomon","sequence":"additional","affiliation":[]},{"given":"D.","family":"Kyle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"the state of the art in dns spoofing","author":"steinhoff","year":"2006","journal-title":"Proc 4th Intl Conf Applied Cryptography and Network Security (ACNS)"},{"key":"22","article-title":"automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities","author":"wang","year":"2006","journal-title":"Proc Symp Network and Distributed System Security"},{"journal-title":"Passive DNS Replication","year":"0","key":"17"},{"key":"23","article-title":"passive dns replication","author":"weimer","year":"0","journal-title":"Proc 17th Annual FIRST Conf"},{"year":"0","key":"18"},{"key":"24","article-title":"dns-based detection of scanning worms in an enterprise network","author":"whyte","year":"2005","journal-title":"Proc 12th Annual Network and Distributed System Security Symp"},{"key":"15","article-title":"an achilles' heel in signature-based ids: squealing false positives in snort","author":"patton","year":"2001","journal-title":"Proc 4th Intl Symp on Recent Advances in Intrusion Detection (RAID)"},{"key":"16","first-page":"49","article-title":"revealing botnet membership using dnsbl counter-intelligence","author":"ramachandran","year":"2006","journal-title":"Proc 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)"},{"journal-title":"Malware Dedicated Whitehats","year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3046"},{"key":"11","article-title":"botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Proc 17th USENIX Security Symp"},{"year":"0","key":"12"},{"journal-title":"Free Online Virus and Malware Scan","year":"0","key":"21"},{"key":"3","first-page":"43","article-title":"an algorithm for anomaly-based botnet detection","author":"binkley","year":"2006","journal-title":"Proc 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)"},{"journal-title":"Truman - The Reusable Unknown Malware Analysis Net","year":"0","author":"stewart","key":"20"},{"key":"2","first-page":"165","article-title":"the nepenthes platform: an efficient approach to collect malware","volume":"4219","author":"ba?cher","year":"2006","journal-title":"LNCS"},{"journal-title":"Know Your Enemy Using Honeynets to Learn More About Bots","year":"0","author":"ba?cher","key":"1"},{"key":"10","article-title":"botsniffer: detecting botnet command and control channels in network traffic","author":"gu","year":"2008","journal-title":"Proc 15th Annual Network and Distributed System Security Symp"},{"key":"7","first-page":"39","article-title":"the zombie roundup: understanding, detecting, and disrupting botnets","author":"cooke","year":"2005","journal-title":"Proc Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)"},{"year":"2007","key":"6","article-title":"expert: botnets are number one internet threat"},{"journal-title":"Understanding and Configuring DHCP Snooping","year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2007.90"},{"key":"9","article-title":"rishi: identify bot contaminated hosts by irc nickname evaluation","author":"goebel","year":"2007","journal-title":"Proc 1st Workshop on Hot Topics in Understanding Botnets"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2827"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","start":{"date-parts":[[2009,6,14]]},"location":"Dresden","end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05198970.pdf?arnumber=5198970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T05:52:16Z","timestamp":1585288336000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5198970\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5198970","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}