{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:34Z","timestamp":1763468194554},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6755058","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"page":"000868-000873","source":"Crossref","is-referenced-by-count":11,"title":["Detection of Fast-Flux Networks using various DNS feature sets"],"prefix":"10.1109","author":[{"given":"Z.","family":"Berkay Celik","sequence":"first","affiliation":[]},{"given":"Sema","family":"Oktug","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Tshark Dump and Analyze Network Traffic","year":"0","author":"combs","key":"15"},{"key":"16","article-title":"Decision tree discovery","author":"kohavi","year":"1999","journal-title":"Data Mining and Knowledge Discovery Handbook"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36618-0_22","article-title":"Using kullback-Ieibler distance for text categorization","author":"bigi","year":"2003","journal-title":"Advances in Information Retrieval"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.35"},{"key":"11","article-title":"Sequential anomaly detection in a batch with growing number of tests: A pplication to network intrusion detection","author":"miller","year":"2012","journal-title":"Proc IEEE International Workshop on Machine Learning for Signal Processing (MLSP)"},{"key":"12","article-title":"Your botnet is my botnet: A nalysis of a botnet takeover","author":"stone-gross","year":"2009","journal-title":"Proceedings of the 2nd IEEELCN Workshop on Network Security"},{"key":"3","article-title":"EXPOSURE: Finding malicious domains using passive DNS analysis","author":"bilge","year":"2011","journal-title":"Proc Network and Distributed System Security Symposium (NDSS)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.35"},{"journal-title":"The Honeynet Project Know Your Enemy Fast-Flux Service Networks","year":"2007","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934985"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"6","article-title":"Fast-flux bot detection in real time","author":"su","year":"2011","journal-title":"Proc Recent Advances in Intrusion Detection"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-70542-0_10","article-title":"Fluxor: Detecting and monitoring fast-flux service networks","author":"passerini","year":"2008","journal-title":"Proc Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"4","article-title":"Measuring and detecting fast-flux service networks","author":"holz","year":"2008","journal-title":"Proc Symposium on Network and Distributed System Security"},{"journal-title":"RFC 5625 DNS Proxy Implementation Guidelines (Best Current Practice)","year":"2009","author":"bellis","key":"9"},{"key":"8","article-title":"Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection","author":"huang","year":"2010","journal-title":"Proc ACM Symp Information Computer Communications Security"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06755058.pdf?arnumber=6755058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:15:22Z","timestamp":1498108522000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6755058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6755058","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}