{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:51:11Z","timestamp":1771699871357,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/iwqos.2011.5931312","type":"proceedings-article","created":{"date-parts":[[2011,6,29]],"date-time":"2011-06-29T19:15:44Z","timestamp":1309374944000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Measuring the effectiveness of infrastructure-level detection of large-scale botnets"],"prefix":"10.1109","author":[{"given":"Yuanyuan","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Guanhua","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Eidenbenz","sequence":"additional","affiliation":[]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298349"},{"key":"ref11","article-title":"Towards automated detection of peer-to-peer botnets: On the limits of local approaches","author":"jelasity","year":"2009","journal-title":"Proc of LEET"},{"key":"ref12","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2001","journal-title":"Proceedings of IPTPS"},{"key":"ref13","article-title":"Estimating daytime and night-time population distributions in u.s. cities for emergency response activities","author":"mcpherson","year":"0","journal-title":"Am Meteorol Soc J"},{"key":"ref14","article-title":"Botgrep: Finding p2p bots with structured graph analysis","author":"nagaraja","year":"2010","journal-title":"19th USENIX Security Symposium"},{"key":"ref15","article-title":"As path inference by exploiting known as paths","author":"qiu","year":"2005","journal-title":"Proceedings of IEEE Globecom"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12334-4_1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref18","article-title":"Multi-scale integrated information and telecommunications system (MIlTS): First results from a large-scale end-to-end network simulator","author":"waupotitsch","year":"2006","journal-title":"Proceedings of the Winter Simulation Conference"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.11.002"},{"key":"ref4","article-title":"An algorithm for anomaly-based botnet detection","author":"binkley","year":"2006","journal-title":"Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet"},{"key":"ref3","article-title":"PRIME SSF","year":"0"},{"key":"ref6","article-title":"BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref5","article-title":"Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?","author":"davis","year":"0","journal-title":"Procs ESORICS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270322"},{"key":"ref7","article-title":"Botsniffer: Detecting botnet command and control channels in network traffic","author":"gu","year":"2008","journal-title":"Proc of NDSS"},{"key":"ref2","article-title":"AS Names","year":"0"},{"key":"ref1","article-title":"aMule","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2009.5072151"},{"key":"ref20","article-title":"Detection of botnets using combined host- and network-level information","author":"zeng","year":"2010","journal-title":"Proceedings of DSN"}],"event":{"name":"2011 IEEE 19th International Workshop on Quality of Service (IWQoS)","location":"San Jose, CA, USA","start":{"date-parts":[[2011,6,6]]},"end":{"date-parts":[[2011,6,7]]}},"container-title":["2011 IEEE Nineteenth IEEE International Workshop on Quality of Service"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5888726\/5931241\/05931312.pdf?arnumber=5931312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:12:27Z","timestamp":1490080347000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5931312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2011.5931312","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}