{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:44:12Z","timestamp":1762004652920},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T00:00:00Z","timestamp":1412121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001868","name":"National Science Council","doi-asserted-by":"crossref","award":["NSC 101-2221-E-008-028-MY2","NSC 103-2623-E-008-003-D","NSC 100-2218-E-008-013-MY3"],"award-info":[{"award-number":["NSC 101-2221-E-008-028-MY2","NSC 103-2623-E-008-003-D","NSC 100-2218-E-008-013-MY3"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/jsac.2014.2358814","type":"journal-article","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T18:38:55Z","timestamp":1411151935000},"page":"1947-1956","source":"Crossref","is-referenced-by-count":14,"title":["Detect Fast-Flux Domains Through Response Time Differences"],"prefix":"10.1109","volume":"32","author":[{"family":"Fu-Hau Hsu","sequence":"first","affiliation":[]},{"family":"Chuan-Sheng Wang","sequence":"additional","affiliation":[]},{"family":"Chi-Hsien Hsu","sequence":"additional","affiliation":[]},{"family":"Chang-Kuo Tso","sequence":"additional","affiliation":[]},{"family":"Li-Han Chen","sequence":"additional","affiliation":[]},{"family":"Song-Hui Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.017"},{"key":"ref11","author":"lemos","year":"2007","journal-title":"Fast Flux Foils Bot-Net Takedown"},{"key":"ref12","first-page":"1","article-title":"Measuring and detecting fast-flux service networks","author":"holz","year":"0","journal-title":"Proc 6th Annu Netw Distrib Syst Security Symp"},{"key":"ref13","first-page":"186","article-title":"FluXOR: Detecting and monitoring fast-flux service networks","volume":"5137","author":"passerini","year":"0","journal-title":"Proc 5th Conf DIMVA"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690854"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.36"},{"key":"ref16","author":"gaudin","year":"2007","journal-title":"Storm Worm Erupts Into Worst Virus Attack in 2 Years"},{"key":"ref17","first-page":"1","article-title":"EXPOSURE: Finding malicious domains using passive DNS analysis","author":"bilge","year":"0","journal-title":"Proc 8th Annu Symp Netw Distrib Syst Security"},{"key":"ref18","first-page":"273","article-title":"Building a dynamic reputation system for DNS","author":"antonakakis","year":"0","journal-title":"Proc 19th USENIX Security Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.44"},{"key":"ref4","year":"2007","journal-title":"Know Your Enemy Fast-Flux Service Networks"},{"key":"ref3","author":"gasster","year":"2008","journal-title":"GNSO Issues Report on Fast Flux Hosting"},{"key":"ref6","year":"2006","journal-title":"Gartner says number of phishing e-mails sent to U S adults nearly doubles in just two years"},{"key":"ref5","year":"2008","journal-title":"SAC 025 SSAC Advisory on Fast Flux Hosting and DNS an Advisory"},{"key":"ref8","year":"2009","journal-title":"A monthly intelligence report from the RSA anti-fraud command center"},{"key":"ref7","year":"2007","journal-title":"Gartner Survey Shows Phishing Attacks Escalated in 2007 More Than $3 Billion Lost to These Attacks"},{"key":"ref2","author":"namestnikov","year":"2009","journal-title":"The Economics of Botnets"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.1.75-84"},{"key":"ref9","first-page":"464","article-title":"Fast-flux bot detection in real time","volume":"6307","author":"hsu","year":"0","journal-title":"Proc 13th Int Symp RAID"},{"key":"ref20","year":"0"},{"key":"ref22","year":"0"},{"key":"ref21","year":"0","journal-title":"Global fast flux"},{"key":"ref24","first-page":"1","article-title":"Tuning TCP parameters for the 21st century","author":"chu","year":"0","journal-title":"Proc 75th IETF"},{"key":"ref23","year":"0"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/6969128\/06905768.pdf?arnumber=6905768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:20Z","timestamp":1642003160000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6905768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":24,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2014.2358814","relation":{},"ISSN":["0733-8716"],"issn-type":[{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2014,10]]}}}