{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:52:08Z","timestamp":1771462328206,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/icnsc.2013.6548817","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T10:57:54Z","timestamp":1373367474000},"page":"660-665","source":"Crossref","is-referenced-by-count":20,"title":["Survey on botnet: Its architecture, detection, prevention and mitigation"],"prefix":"10.1109","author":[{"given":"I.","family":"Ullah","sequence":"first","affiliation":[]},{"given":"N.","family":"Khan","sequence":"additional","affiliation":[]},{"given":"H. A.","family":"Aboalsamh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2009.127"},{"key":"35","author":"project","year":"2005","journal-title":"Know your enemy Tracking botnets"},{"key":"17","author":"tang","year":"0","journal-title":"Defending Against Internet Worms A Signature-Based Approach"},{"key":"36","author":"honeynet project c","year":"0"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2007.90"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ITAPP.2010.5566407"},{"key":"15","year":"0"},{"key":"34","article-title":"Rishi: Identify bot contaminated hosts by irc nickname evaluation","author":"goebel","year":"0","journal-title":"HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets"},{"key":"16","year":"0"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/ITAPP.2010.5566407"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.35"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690855"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.35"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.418"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIT.2010.5508552"},{"key":"12","author":"dae-il","year":"0","journal-title":"Analysis of HTTPP2P Botnet Case Study Waledac"},{"key":"21","article-title":"Revealing botnet membership using dnsbl counter-intelligence","author":"ramachandran","year":"2006","journal-title":"Proc 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '06"},{"key":"20","volume":"5","author":"schonewille","year":"2006","journal-title":"The Domain Name Service As An IDS How DNS Can Be Used for Detecting and Monitoring Badware in A Network"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654996"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2010.11"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2010.10"},{"key":"22","article-title":"Automatically generating models for botnet detection","author":"wurzinger","year":"0","journal-title":"ESORICS 2009"},{"key":"23","first-page":"43","article-title":"An algorithm for anomaly-based botnet detection","author":"binkley","year":"2006","journal-title":"Proc USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI'06"},{"key":"24","article-title":"Botsniffer: Detecting botnet command and control channels in network traffic","author":"gu","year":"2008","journal-title":"Proc 15th Annual Network and Distributed System Security Symposium (NDSS'08"},{"key":"25","first-page":"190","author":"schaffrath","year":"2008","journal-title":"Conceptual Integration of Flow-based and Packet-based Network Intrusion Detection"},{"key":"26","article-title":"Detecting peer-to-peer botnets","author":"schoof","year":"0","journal-title":"2007 System and Network Engineering University of Amsterdam"},{"key":"27","article-title":"Using uncleanliness to predict future botnet addresses","author":"patrick collins","year":"2007","journal-title":"Copyright ACM"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690855"},{"key":"29","article-title":"A distributed content independent method for spam detection","author":"brodsky","year":"2007","journal-title":"Proc 1st Workshop on Hot Topics in Understanding Botnets 2007"},{"key":"3","article-title":"Botnet Detection by Abnormal IRC Traffic Analysis","author":"lai","year":"0","journal-title":"Acknowledgement This Work Was Supported in Part by TWISC NCKU and ICAST"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"10","first-page":"6","article-title":"Toward botnet mesocosms","author":"barford","year":"2007","journal-title":"Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets"},{"key":"1","article-title":"Botnet: An overview","author":"saha","year":"2005","journal-title":"CERT-In White PaperCIWP-2005-05"},{"key":"30","article-title":"A survey of bots used for distributed denial of service attacks","author":"thing","year":"0","journal-title":"22nd IFIP International Information Security Conference (SEC"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123125"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2010.575"},{"key":"32","author":"masud","year":"0","journal-title":"Flow Based Identification of Botnet Traffic by Minning Multiple Log Files"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690856"},{"key":"31","article-title":"Bothunter: Detecting malware infection through ids-driven dialog correlation","author":"gu","year":"2007","journal-title":"Proc of the 16th USENIX Security Symp"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"9","year":"2007","journal-title":"The Deterlab Network Security Testbed Based on Emulab"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.61"}],"event":{"name":"2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC 2013)","location":"Evry","start":{"date-parts":[[2013,4,10]]},"end":{"date-parts":[[2013,4,12]]}},"container-title":["2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530812\/6548700\/06548817.pdf?arnumber=6548817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:31:10Z","timestamp":1490214670000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6548817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2013.6548817","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}